Philosophical debates over OpenStack vs. vCloud or OpenDaylight vs. Cisco ACI miss the point. For IT, ideological purity is neither possible nor desirableBy Kurt Marko Contributing Editor, 11/20/20143 comments | Read | Post a Comment
The National Oceanic and Atmospheric Administration finally confirms that four websites were attacked and taken down in September, but details are sketchy and officials want answers.By Sara Peters Senior Editor at Dark Reading, 11/13/20142 comments | Read | Post a Comment
As businesses rely on more complex systems with more tools from different vendors, traditional security measures are becoming increasingly inadequate.By Marc van Zadelhoff IBM Securityís Vice President of Worldwide Strategy and Product Management, 11/13/20148 comments | Read | Post a Comment
New rule requires US government contractors to gather and report information on insider threat activity on classified networks.By Adam Firestone President & GM, Kaspersky Government Security Solutions, 11/13/20145 comments | Read | Post a Comment
A Pew Research Center study finds broad concern about government and corporate data gathering, along with a desire for more government regulation of data gathering.By Thomas Claburn Editor-at-Large, 11/13/20148 comments | Read | Post a Comment
Researchers name five Iranian industrial control systems companies attacked in 2009-2010, and they question whether USB sticks were really the method of infection.By Sara Peters Senior Editor at Dark Reading, 11/11/20145 comments | Read | Post a Comment
IBM's Dynamic Cloud Security can monitor and analyze data access activity and applications in IBM SoftLayer, Salesforce.com, and Amazon.By Charles Babcock Editor At Large, InformationWeek , 11/5/20141 Comment | Read | Post a Comment
Facebook wants to allow people to use its service without being watched or censored. Is that some kind of privacy oxymoron?By Thomas Claburn Editor-at-Large, 10/31/20143 comments | Read | Post a Comment
Cyber security sometimes turns up as a campaign issue, but effective legislation has stalled. It's time for a rational approach to regaining trust in our digital world.By W. Hord Tipton , 10/31/20144 comments | Read | Post a Comment
The retail industry's R-CISC has been up and running for four months now and is looking for more retailers to sign up.By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/30/20148 comments | Read | Post a Comment
Mitigation efforts have caused temporary outages and loss of connectivity for some staff, but no computers have been damaged, official says.By Jai Vijayan Freelance writer, 10/29/20142 comments | Read | Post a Comment
FTDI's update, targeting counterfeit chips, could disable systems widely embedded in healthcare, critical infrastructure, and consumer products.By Jai Vijayan Freelance writer, 10/28/20143 comments | Read | Post a Comment
To meet regulatory obligations -- and avoid accusations of cover-up and incompetence -- federal agencies must get serious about digitizing records.By Ellis Booker Technology Journalist, 10/27/20145 comments | Read | Post a Comment
Hot stories this week include saying 'No' to crypto backdoors for law enforcement, new roles for IT on Wall Street, and more.By Andrew Conry Murray Director of Content & Community, Interop, 10/24/20140 comments | Read | Post a Comment
InformationWeek Tech Digest, Nov. 10, 2014Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Security Job #1 For FedsThe 2014 InformationWeek Government IT Priorities Survey shows federal IT pros care about security - itís rated as very important by 69% of respondents, 30 percentage points ahead of the No. 2 priority, disaster recovery. Will the upcoming NIST cyber-security framework help manage risk?