InformationWeek News Connects The Business Technology Community
IoT
IoT
Brooks Brothers In Style As It Moves To Cloud
IT Headed For Fundamental Changes, SIM Survey Shows
Amazon Tests New Retail Consumer Checkout System
The Non-IT CIO: Information Over Infrastructure
Multi-Cloud Management: What to Realistically Expect in 2017
News & Commentary
Obama: US Will Retaliate Against Russian Cyberattacks In Proportional Manner
Jai Vijayan, Freelance writer
News
US action will include both covert and explicit response, President says. Meanwhile, a Russian-speaking hacker was discovered behind a data breach of the US Election Assistance Commission (EAC).
By Jai Vijayan Freelance writer, 12/16/2016
Comment2 comments  |  Read  |  Post a Comment
Docker Move Brings Universal Container Operations A Step Closer
Charles Babcock, Editor at Large, Cloud
News
Docker has contributed a component of Docker Engine, Containerd, to the community; it will provide a key element of a universal runtime.
By Charles Babcock Editor at Large, Cloud, 12/16/2016
Comment0 comments  |  Read  |  Post a Comment
Has The Security Industry Failed Its Customers?
Steve Manzuik, Director of Security Research at Duo Security's Duo Labs
Commentary
Short answer: Not really. But the odds of staying safe from a cyberattack go way up when you follow these six tips for security hygiene.
By Steve Manzuik Director of Security Research at Duo Security's Duo Labs, 12/16/2016
Comment0 comments  |  Read  |  Post a Comment
Real-World Fallout From The Cybersecurity Skills Gap
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Two new studies connect the dots between an organization’s lack of staffing and skills to its ability to fend off cyberattacks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/15/2016
Comment0 comments  |  Read  |  Post a Comment
Hurricanes, Earthquakes & Threat Intelligence
Jonathan Couch, Senior VP of Strategy, ThreatQuotient
Commentary
You must be prepared for foreseeable attacks as well as the ones that sneak up on you.
By Jonathan Couch Senior VP of Strategy, ThreatQuotient, 12/15/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft Execs: Identity, Threat Intelligence Driving Company's Security Strategy
Kelly Sheridan, Associate Editor, InformationWeek
News
One year after Microsoft announced its $1B investment into a holistic cybersecurity strategy, executives discuss how their plans unfolded and what's on the agenda for 2017.
By Kelly Sheridan Associate Editor, InformationWeek, 12/15/2016
Comment0 comments  |  Read  |  Post a Comment
Why Embedded Analytics Will Change Everything
Lisa Morgan, Freelance Writer
Commentary
Analytics is being embedded in all kinds of software which suggests a major shift is on the horizon. How we think about analytics will change and so will our use of analytics. We explain why.
By Lisa Morgan Freelance Writer, 12/15/2016
Comment0 comments  |  Read  |  Post a Comment
Survey: Majority Of Businesses Would Pay Ransomware Attackers
Jai Vijayan, Freelance writer
News
Nearly 70% of ransomware victims surveyed by IBM said they paid between $10K and $40K to retrieve their data.
By Jai Vijayan Freelance writer, 12/14/2016
Comment0 comments  |  Read  |  Post a Comment
Four Keys to Thriving in STEM and IT as a Woman
Sheila Stewart, Senior Sales Engineer, MarkLogic, Inc.
Commentary
It isn't fair that women have to put in extra effort to succeed in male-dominated STEM fields, but MarkLogic's Sheila Stewart shares four great tips.
By Sheila Stewart Senior Sales Engineer, MarkLogic, Inc., 12/14/2016
Comment2 comments  |  Read  |  Post a Comment
10 Tech Companies That Stole the Spotlight In 2016
Cynthia Harvey, Contributor, NetworkComputing
News
A look back how companies like Google and newer players on the scene like Docker changed the IT landscape this year.
By Cynthia Harvey , 12/14/2016
Comment1 Comment  |  Read  |  Post a Comment
8 Most Hackable Holiday Gifts, 2016 Edition
Terry Sweeney, Contributing Editor
News
You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices.
By Terry Sweeney Contributing Editor, 12/14/2016
Comment0 comments  |  Read  |  Post a Comment
Leveraging Open Source Reference Architectures Allows You To Give And Take From Broader Expertise
Brent Compton, Director of Storage and Big Data Ecosystem, Red Hat
Many standard storage server manufacturers have participated in the development of reference architectures, providing great insight into how to best deploy their servers for each of your company’s use cases.
By Brent Compton Director of Storage and Big Data Ecosystem, Red Hat, 12/14/2016
Comment1 Comment  |  Read  |  Post a Comment
EBay, Challenged To Personalize Email Marketing, Customizes CRM
Charles Babcock, Editor at Large, Cloud
News
EBay put custom CRM on top of its SendGrid email system to be able to address millions of customers with an individual message.
By Charles Babcock Editor at Large, Cloud, 12/14/2016
Comment0 comments  |  Read  |  Post a Comment
Vendor Accountability & The Security Supply Chain
Ericka Chickowski, Contributing Writer, Dark Reading
News
A large majority of security leaders say they would switch to suppliers that offer product and service guarantees, according to a new survey.
By Ericka Chickowski Contributing Writer, Dark Reading, 12/14/2016
Comment0 comments  |  Read  |  Post a Comment
Multi-Cloud Management: What to Realistically Expect in 2017
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
Learn what you should realistically expect from your multi-cloud management solution in 2017 -- and what you may have to wait for until 2018 and beyond.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 12/14/2016
Comment1 Comment  |  Read  |  Post a Comment
IT Spending Expected to Pick Up in 2017
Marcia Savage, Managing Editor, Network Computing
News
TEKsystems research finds many IT leaders have a positive outlook on next year with a focus on cloud and security.
By Marcia Savage Managing Editor, Network Computing, 12/13/2016
Comment1 Comment  |  Read  |  Post a Comment
Most Analytics Opportunities Untapped, McKinsey
Jessica Davis,  Senior Editor, Enterprise Apps
News
Revisiting the research that highlighted future analytics talent shortages back in 2011, McKinsey Global Institute says that we're barely scratching the surface in making good use of data.
By Jessica Davis Senior Editor, Enterprise Apps, 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
The Internet Of Things: When Bigger Is Not Better
Paul Vixie, Chairman & CEO, Farsight Security, Inc.
Commentary
What happens when 10,000 companies add programmability and connectivity to their products, and we increase the Internet’s attack surface by a million times or more?
By Paul Vixie Chairman & CEO, Farsight Security, Inc., 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
91% Of Cyberattacks Start With A Phishing Email
Steve Zurier, Freelance Writer
News
Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.
By Steve Zurier Freelance Writer, 12/13/2016
Comment2 comments  |  Read  |  Post a Comment
Nearly Half Of The Top 1 Million Websites Deemed Risky
Kelly Sheridan, Associate Editor, InformationWeek
News
Forty-six percent of the top million websites, as ranked by Alexa, pose potential malware risks to businesses.
By Kelly Sheridan Associate Editor, InformationWeek, 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
News
Trulia Pursues Data-Driven Transformation, Cloud Migration
Jessica Davis, Senior Editor, Enterprise Apps,  12/13/2016
News
Amazon CTO Vogels: 'We're in the pain management business'
Charles Babcock, Editor at Large, Cloud,  12/12/2016
Commentary
Multi-Cloud Management: What to Realistically Expect in 2017
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  12/14/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
Leveraging Open Source Reference Architectures Allows You To Give And Take From Broader Expertise
Many standard storage server manufacturers have participated in the development of reference architectures, providing great insight into how to best deploy their servers for each of your company's use cases. Read >>
Partner Perspectives
What's This?
Job Loss And Financial Damage: CIOs' Main Fears When Adopting Virtualization
Companies aren't prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals. Read >>
White Papers
Current Issue
InformationWeek Salary Survey: 10 Best Paying Jobs
InformationWeek's 2016 US IT Salary Survey found that the median base salary for IT workers remained flat this year. However, some positions are commanding much higher median salaries than other roles.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Flash Poll