InformationWeek News Connects The Business Technology Community
IoT
IoT
Agile Is King, But Continuous Integration Is An Elusive Goal
Expert: Threats To Secure Cloud Operations Are Evolving
Infographic: 2017 State of the Cloud
5 Security Considerations For The Hybrid Cloud
Big Data Leadership: CIO, CAO, Or Maybe The Big Dog
News & Commentary
It's Still 'Intel Inside', But Now Intel's Inside The Cloud
Charles Babcock, Editor at Large, Cloud
News
Intel re-architects x86 toward the needs of the cloud, builds in management features for large scale server power savings.
By Charles Babcock Editor at Large, Cloud, 2/1/2017
Comment0 comments  |  Read  |  Post a Comment
Podcast: A Look Into The Cloud For 2017
Emily Johnson, Associate Editor, UBM Americas
News
InformationWeek spoke with the author of our 2017 State of the Cloud report to get his take on the data and trends in cloud computing.
By Emily Johnson Associate Editor, UBM Americas, 2/1/2017
Comment0 comments  |  Read  |  Post a Comment
A New Mantra For Cybersecurity: 'Simulate, Simulate, Simulate!'
Danelle Au, VP Strategy, SafeBreach
Commentary
What security teams can learn from the Apollo 13 space program, a global pandemic, and major infrastructure disruptions to identify their best responses to attacks.
By Danelle Au VP Strategy, SafeBreach, 2/1/2017
Comment0 comments  |  Read  |  Post a Comment
Identity Fraud Rose 16% In 2016
Steve Zurier, Freelance Writer
News
Javelin report finds that fraud increased to 15.4 million consumers in the US - the highest ever.
By Steve Zurier Freelance Writer, 2/1/2017
Comment0 comments  |  Read  |  Post a Comment
What To Consider When Hiring Data Science Talent
Guest Commentary, Guest Commentary
Commentary
Dealing with the data science talent crunch isn't just about competing for talent; it also requires the right data science strategy to help the analytics team be effective and efficient.
By Guest Commentary Guest Commentary, 2/1/2017
Comment0 comments  |  Read  |  Post a Comment
Report Says Death Of The Password Greatly Exaggerated
Ericka Chickowski, Contributing Writer, Dark Reading
News
Passwords are far from dead - thanks to the Internet of Things, the traditional authentication mechanism will explode in the next decade,
By Ericka Chickowski Contributing Writer, Dark Reading, 1/31/2017
Comment0 comments  |  Read  |  Post a Comment
Agile Is King, But Continuous Integration Is An Elusive Goal
Charles Babcock, Editor at Large, Cloud
News
A Dimension Data survey of development professionals found most enterprises have adopted agile methods, but only 14% can update hourly.
By Charles Babcock Editor at Large, Cloud, 1/31/2017
Comment0 comments  |  Read  |  Post a Comment
Break Down Those Silos To Gain Business Agility
Guest Commentary, Guest Commentary
Commentary
If you want your enterprise to be agile, look first at your data silos -- silos packed with information -- that keep people and departments from communicating effectively.
By Christopher O'Malley, CEO, Compuware , 1/31/2017
Comment0 comments  |  Read  |  Post a Comment
6 Free Ransomware Decryption Tools
Steve Zurier, Freelance Writer
News
The No More Ransom group has been working to get free decryptor tools into the hands of security professionals and the general public.
By Steve Zurier Freelance Writer, 1/30/2017
Comment0 comments  |  Read  |  Post a Comment
Netflix Scam Spreads Ransomware
Kelly Sheridan, Associate Editor, InformationWeek
News
A program found on suspicious websites aims to trick Windows/PC users into creating fake Netflix logins so it can deliver ransomware.
By Kelly Sheridan Associate Editor, InformationWeek, 1/30/2017
Comment0 comments  |  Read  |  Post a Comment
What 2017 Will Bring for the Analytics Field
Guest Commentary, Guest Commentary
Commentary
Enterprises have plenty of data; now it's time to put that data to work, answering questions such as "why" and "what's next".
By Ketan Karkhanis, GM of Salesforce Analytics Cloud , 1/30/2017
Comment0 comments  |  Read  |  Post a Comment
Why You’re Doing Cybersecurity Risk Measurement Wrong
Daniel Gordon, Cyber Intel Analyst, Lockheed Martin Computer Incident Response Team
Commentary
Measuring risk isn’t as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are five.
By Daniel Gordon Cyber Intel Analyst, Lockheed Martin Computer Incident Response Team, 1/30/2017
Comment0 comments  |  Read  |  Post a Comment
Expert: Threats To Secure Cloud Operations Are Evolving
Charles Babcock, Editor at Large, Cloud
News
John Howie, former COO of the Cloud Security Alliance, says secure providers aren't enough; threats to users are evolving fast.
By Charles Babcock Editor at Large, Cloud, 1/30/2017
Comment0 comments  |  Read  |  Post a Comment
Infographic: 2017 State of the Cloud
Emily Johnson, Associate Editor, UBM Americas
News
Is private cloud on its way out and is hybrid cloud practical? This infographic provides a snapshot of key data points from our 2017 State of the Cloud report.
By Emily Johnson Associate Editor, UBM Americas, 1/30/2017
Comment0 comments  |  Read  |  Post a Comment
7 Tips For Getting Your Security Budget Approved
Kelly Sheridan, Associate Editor, InformationWeek
News
How to have a productive conversation with business leaders and get your security budget approved.
By Kelly Sheridan Associate Editor, InformationWeek, 1/27/2017
Comment0 comments  |  Read  |  Post a Comment
Target CIO Transforms Retailer With In-house Talent, Agile
Jessica Davis,  Senior Editor, Enterprise Apps
News
Target hired Tesco veteran Mike McNamara 18 months ago as CIO and Chief Digital Officer to transform the company's IT and software development organization. Here's what he did.
By Jessica Davis Senior Editor, Enterprise Apps, 1/27/2017
Comment1 Comment  |  Read  |  Post a Comment
5 Security Considerations For The Hybrid Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
Even though your infrastructure, applications, and data are off in the cloud, don't assume that you are off the hook when it comes to compliance. You are still responsible for that data.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 1/27/2017
Comment0 comments  |  Read  |  Post a Comment
Big Data Leadership: CIO, CAO, Or Maybe The Big Dog
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
In the discussion over who should lead a corporate big data initiative, maybe it should be someone other than the CIO, CAO, or CDO.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 1/27/2017
Comment0 comments  |  Read  |  Post a Comment
IT Service Management In Disruption, Moving Toward Automation
Charles Babcock, Editor at Large, Cloud
News
A wave of change is sweeping through the suppliers of ITSM, reflecting the enhanced ability to add analytics and automation to the field.
By Charles Babcock Editor at Large, Cloud, 1/26/2017
Comment1 Comment  |  Read  |  Post a Comment
How I Would Hack Your Network (If I Woke Up Evil)
John Strand, SANS Senior Instructor & Owner, Black Hills Information Security
Commentary
How would an attacker target your company? Here's a first-person account of what might happen.
By John Strand SANS Senior Instructor & Owner, Black Hills Information Security, 1/26/2017
Comment16 comments  |  Read  |  Post a Comment
More Stories
Commentary
Be Recognized For IT Excellence
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief,  1/12/2017
News
Kinetica Uses GPUs for Advanced In-Database Analytics
Lisa Morgan, Freelance Writer,  1/24/2017
News
Deep-Seated Container Vulnerability Found, Corrected
Charles Babcock, Editor at Large, Cloud,  1/23/2017
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
Making The Most Of Software-Defined-Storage With Consulting, Training & Support
Companies such as Red Hat have become important for software-defined storage by providing access to the expertise, training, and support user organizations need to take fullest advantage of SDS. Read >>
Partner Perspectives
What's This?
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Flash Poll