Smart Cities Can Get More Out Of IoT, Gartner Finds
While many smart cities are using IoT for transportation issues, there's a host of other initiatives these urban centers should start to address with the technology. Environmental and sustainability programs top a new list from Gartner.
10 Priorities, Concerns Facing State CIOs
State CIOs are not immune to the enterprise transformation issues that are hitting IT organizations everywhere. Here's a look inside the trends at the state government level, from the annual NASCIO State CIO Survey for 2016.
Top 125 Vendors To Watch
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
Tim Cook: Privacy Is Worth Protecting
Apple CEO Tim Cook leans on the Founding Fathers to suggest the company did the right thing when asked by the FBI to unlock a terrorist's iPhone. It's an issue that affects IT professionals who need to protect company data, as well as consumers and their personal information.
10 IoT Security Best Practices For IT Pros
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
Using AI To Fight Cyberthreats
SparkCognition, working with Carnegie Mellon and IBM's Watson, aims to provide cyber-security researchers with better threat data using predictive models powered by machine learning.
Lawsuit Raises Questions About The Right To Tinker With Tech
The Electronic Frontier Foundation has filed a lawsuit to overturn a provision in the Digital Millennium Copyright Act which limits the modification of technology. For anyone managing information technology, the law in question has the potential to limit access to data, to weaken security, and to impose unnecessary burdens, costs, and liabilities.
Can 3D-Printed Fingers Help Police Solve A Murder?
Michigan police are working with university researchers to re-create a dead man's fingers. The goal is to use the digits to unlock his smartphone and uncover information that may help catch his killer.
Microsoft Launches Online Data Science Degree Program
Microsoft is addressing the shortage of workers with data science skills with a new professional degree program offered online. The company said the data science degree will serve as a pilot for future offerings.
10 Hot SaaS Security Startups To Watch
Leveraging cloud-based security services is helping to solve some major stumbling blocks when it comes to providing a robust architecture for organizations. To help you navigate your options, we're spotlighting 10 SaaS security startups whose tools are worth a look.
Beyond BlackBerry: Outdated Tech The Feds Should Dump
The US Senate is finally ditching BlackBerry devices. Now, if only the rest of the government could leave the past behind. Here's a look at outdated tech still being used by federal agencies, including the military and the IRS.
8 Reasons You Need A Security Penetration Test
One of the biggest challenges in IT security is determining whether the tools and configurations you have in place are giving your organization the level of security you require. Here's how penetration testing can help.
9 Tech Giants Embracing The Open Source Revolution
It was only 15 years ago that Microsoft's then-CEO likened open source software licenses to "a cancer." But today, Redmond is joining other tech giants in donating intellectual property to the hive mind of open source. Here's why it matters.
Security Threats Hiding In Plain Sight
IT professionals would rather manage external threats than worry about insiders, a recent survey by Soha finds. But singular focus when it comes to security can end up being a costly mistake.
LinkedIn Hack: Why Breach Is A Wake-Up Call For Users
The 2012 LinkedIn security breach is far worse than previously reported. Now reports say that hackers are trying to sell information for more than 117 million accounts, which should have people who use the same password on multiple sites worried.
FBI Chief: Battle Over Encrypted Devices Rages On
Despite dropping its fight with Apple over creating a backdoor to access the iPhone used by one of the San Bernardino shooters, the FBI still plans to pursue access to other encrypted devices and data, said the agency's director.
Twitter Blocks US Spy Agencies' Access To Dataminr
Silicon Valley's fight to protect users' privacy against inquiries by intelligence agencies could escalate with Twitter denying access to a data mining service that reveals political unrest and terrorist attacks in real-time.
FBI Won't Share iPhone Hack With Apple, Report Says
The FBI paid approximately $1 million for a hack into an encrypted iPhone, and now plans to keep the details to itself, according to The Wall Street Journal. The government also dropped case against Apple in Brooklyn -- and that has law enforcement fuming.
Burr-Feinstein Encryption Bill Rankles Tech Community
A coalition of tech groups called proposed encryption legislation "well-intentioned but ultimately unworkable," while an op-ed deemed it grounds for the dismissal of Senators Dianne Feinstein and Richard Burr, the bill's sponsors.
IT Pros Fear Encryption Backdoors
A survey of IT professionals by network services company Spiceworks finds concern about the risk of backdoors that bypass encryption.