Google for Work users can access a Devices and Activity dashboard to spot suspicious logins and a new security wizard to help navigate security settings.By Kristin Burnham Senior Editor, InformationWeek.com, 11/25/20140 comments | Read | Post a Comment
The hybrid cloud model is already pervasive in many IT environments. It's time to embrace the hybrid reality and IT's role as a cloud broker.By Kent Christensen practice director for cloud and virtual data centers, Datalink, 11/25/20140 comments | Read | Post a Comment
Retired from government service, Linda Cureton is putting long hours into a consulting business (but also envisioning a "real" retirement someday).By David F Carr Editor, InformationWeek Government/Healthcare, 11/25/20141 Comment | Read | Post a Comment
Agile development strategies improve internal productivity, but you also need to use them outside the company walls with customers.By Frédéric Lepied and Alexis Monville , 11/25/20142 comments | Read | Post a Comment
Security breach that exposed personal data on 4.5 million Tennessee healthcare system patients offers key lessons to prevent similar cyber attacks.By Paula Knippa Attorney, 11/25/20141 Comment | Read | Post a Comment
Is your holiday shopping list full of smartphones, robots, and drones? Here's our advice on what gadgets not to buy.By Doug Henschen Executive Editor, InformationWeek, 11/25/201422 comments | Read | Post a Comment
Wondering how you're going to survive all that time with the family over the holidays? Here are some tools to help calm your nerves as relatives try your patience.By Network Computing Editors , 11/25/20147 comments | Read | Post a Comment
"Regin" cyber spying platform is reportedly behind cyber spying against a Belgian telecommunications provider, which was revealed in leaked NSA documents.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/24/20144 comments | Read | Post a Comment
Federal Aviation Administration rules reportedly will require pilot certification to fly unmanned aircraft systems for commercial purposes.By Thomas Claburn Editor-at-Large, 11/24/20143 comments | Read | Post a Comment
Much like one of his favorite choose-your-own-adventure novels, Mark Potter's path to the chief information security officer job was full of twists, turns, and a couple of falls off a cliff.By Sara Peters Senior Editor at Dark Reading, 11/24/20141 Comment | Read | Post a Comment
LinkedIn's latest updates include blogging and mobile app redesigns, adding certifications to your profile, a custom infographic tool, and WeChat integration.By Kristin Burnham Senior Editor, InformationWeek.com, 11/24/20148 comments | Read | Post a Comment
Let's move past 1990s regulations and preconceived notions about net neutrality and focus on modern ways to prevent anti-competitive behavior.By Jonathan Feldman CIO, City of Asheville, NC, 11/24/201421 comments | Read | Post a Comment
InformationWeek Tech Digest, Nov. 10, 2014Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.