The theft of Cisco Systems' source code, which runs much of the company's networking gear, poses security risks, but how high is uncertain. If enough code was stolen, hackers could trick companies into downloading back doors or Trojan horse applications, says Gartner security analyst John Pescatore. Cisco declined to provide details on the stolen code, parts of which appeared in a report on a Russian security firm's Web site. The risk for companies running Cisco gear depends on how much, and what type, of source code was pilfered, says Stuart McClure, president and chief technology officer at information-security company Foundstone Inc. "If it's complete modules or large chunks of code," he says, "the risk is substantially higher."
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.