IBM Denies Layoff Size As Salesforce CEO Woos Talent
IBM called reports that it is laying off a third of its workforce "outlandish and untrue." That's not stopping Salesforce CEO Marc Benioff from publicly inviting IBM employees to apply for open posts at his firm.
How Stryker's First-Ever CISO Reined In Cloud Chaos
From her post as deputy CIO of The White House to being named the first-ever CISO at Stryker, a medical device manufacturer, Alissa Johnson is no stranger to challenges. Here's a look at how she reined in an environment loaded with cloud applications and shadow IT.
Healthcare.gov: Hard-Earned Lessons For CIOs
It's been just over two years since the controversial and troubled launch of Healthcare.gov, a marquee project for a new age of digital government, implementing a politically controversial policy of affordable healthcare insurance for everyone. As of today more than 6 million people have been enrolled through this system. InformationWeek caught up with Healthcare.gov's technology lead to talk about lessons learned.
HPE Fortifies Security For Mobile And Enterprise
HPE Security is looking to improve the security of mobile devices and the enterprise overall with two new security offerings announced in conjunction with the RSA Conference. HPE also released its Cyber Risk Report 2016.
Security Concerns Continue Amid Cloud Adoption
While most top IT executives at companies of all sizes continue to express concern about the security of data in the cloud, that hasn't slowed their move to embrace this new infrastructure as a home for corporate data. A new survey and report reveal their top security nightmares and provides some recommendations about how to protect data in the cloud.
Apple Fights FBI Over Disabling Security In San Bernadino Case
The FBI wants Apple to help it crack the passcode of an iPhone owned by one of the shooters in the December San Bernardino attack that killed 14 people. But CEO Tim Cook says this demand would "undermine the very freedoms and liberty our government is meant to protect."
Rise And Fall Of The Chief Data Officer
The C suite is expanding with more roles dedicated to data and analytics. The Chief Data Officer, or CDO, is one of these roles seen more often in some industries than others. The position may evolve with time. We explain some of the dynamics that cause CDOs to succeed and fail.
BIOS Hack Detection Added To Dell Enterprise Security Suite
With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.
IoT Shows Its Worth To Businesses
The Internet of Things (IoT) can be used for a diverse set of tasks, including opening up new business models. A recent Forrester report explores how businesses are embracing IoT.
Brave Browser Aims To End Ad-Blocking War
10 Healthcare Wearables, Devices Dominating CES
This year's wearables go beyond basic step counting to measure core health data such as blood pressure, vision quality, and body temperature. At CES 2016, InformationWeek got up close and personal with the latest wave of health-centric devices.
Healthcare IT: Hot Trends For 2016, Part 2
In the second of this two-part series on healthcare IT, we look at the influx of healthcare data and what it will mean for practitioners and IT professionals. In part one, we explored the ways in which advances in patient-focused data collection, wearables, and the Internet of Things will change how doctors and patients communicate.
Healthcare IT: Hot Trends For 2016, Part 1
In the first of this two-part series on healthcare IT, we look at the ways in which advances in patient-focused data collection, wearables, and the Internet of Things will change how doctors and patients communicate. In the second part, we look at the influx of healthcare data, and what it will mean for practitioners and IT professionals.
ORWL Aspires To Be A Secure PC
The small, tamper-resistant device is the focus of a Kickstarter campaign. Olivier Boireau, CEO of Design SHIFT, makers of the ORWL, said he believes the device will appeal to companies interested in privacy and data security.
14 Creepy Ways To Use Big Data
The amount of data being collected about people, companies, and governments is unprecedented. What can be done with that data is downright frightening. From bedrooms to boardrooms, from Wall Street to Main Street, the ground is shifting in ways that only the most cyber-savvy can anticipate. We reveal the creepy ways to use data now and in the near future.
Fitbit Hacked In 10 Seconds
A Fortinet security researcher says the fitness tracker can be hacked by anyone within Bluetooth range. It doesn't matter whether or not it's paired with another device.
Apigee, Ex-CTO Of US Aim To Make EHR Data Access Easier
With backing from former US CTO Aneesh Chopra, Apigee is trying to make healthcare access easier. The API developer is rolling out a new platform that helps bridge some of the interoperability gaps when it comes to electronic healthcare records.
Blue Cross CIO: Big Data Can Fix Healthcare Quality, Costs
The Axis big data initiative at Blue Cross Blue Shield Association incorporates more than $350 billion in annual claims, 36 million provider records, and more than 700,000 BCBS patient reviews, all with the goal of helping healthcare consumers make informed decisions. BCBSA CIO Doug Porter takes us through the project.
8 Epic Software Fails: From Volkswagen To IRS
While Volkswagen's recent software scandal raises serious ethical concerns, it's certainly not the only remarkable software failure this year. Here's a rundown of what can happen when good software goes bad. As we head into fourth quarter 2015, we can't help but wonder what's next.
Keyless Security Not So Secure
A suppressed security paper shines a light on the shortcomings of the cryptography used to protect keyless vehicle access systems.
Online Security: How The Experts Keep Safe
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.
14 Security Fails That Cost Executives Their Jobs
Katherine Archuleta, the director of the Office of Personnel Management, is the latest casualty of a data breach, but she's certainly not the only one. There's no job security when your job is security.