By understanding what happened, when, how, and why, security teams can prevent similar breaches from occurring in the future.By Craig Carpenter President & COO, Resolution1 Security, 12/24/20143 comments | Read | Post a Comment
Sources close to the breach investigation say a network server missing two-factor authentication let attackers make their way into JPMorgan's servers.By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/24/20143 comments | Read | Post a Comment
Many network managers and sysadmins will toil away during the holiday season dealing with remote access issues and other problems, an Ipswitch survey finds.By Marcia Savage Managing Editor, Network Computing, 12/24/20143 comments | Read | Post a Comment
Facebook's open data center designs offer efficiency and flexibility, but should your enterprise follow the Open Compute Project model? Here are some pros and cons.By Jim O'Reilly Consultant, 12/24/20141 Comment | Read | Post a Comment
A journalist who writes about software writes his own and finds out coding is not easy. In fact, easy is particularly hard.By David F Carr Editor, InformationWeek Government/Healthcare, 12/23/20148 comments | Read | Post a Comment
Travel analytics firm Boxever thrives while executing three or four updates a day to its core systems on Cassandra in Amazon cloud.By Charles Babcock Editor At Large, InformationWeek , 12/23/20145 comments | Read | Post a Comment
RSA report on Backoff dives deeper into clues about the POS software and hints at attackers potentially located in India.By Ericka Chickowski Contributing Writer, Dark Reading, 12/23/20140 comments | Read | Post a Comment
New Payment Card Industry security standards that take effect January 1 aim to replace checkmark mindsets with business as usual processes. Here are three examples.By Troy Leach and Christopher Strand Chief Technology Officer, PCI Security Standards Council & Senior Director of Compliance, Bit9, 12/23/20141 Comment | Read | Post a Comment
In 2015, software defined networking will move from niche technology to one that creates real business value.By Jonathan Davidson SVP & GM, Security, Switching & Solutions Business Unit, Juniper Networks, 12/23/20141 Comment | Read | Post a Comment
Satellites, balloons, and drones -- oh my! Today's tech wunderkinds have found the answer to global warming. By Howard Anderson Senior Lecturer, Harvard Business School, 12/23/20147 comments | Read | Post a Comment
Maybe you didn't hear about these science and technology breakthroughs, from robots to space exploration. But they will be remembered 20 years from now.By John Barnes freelance writer, 12/23/20142 comments | Read | Post a Comment
Software costs add up quickly in today's virtualized datacenters. Does it make more sense to buy a few big servers or a bunch of little ones? I compare the costs.By Howard Marks Network Computing Blogger, 12/23/20140 comments | Read | Post a Comment
Data breaches will continue until we create a deeper appreciation for business data and guard it as closely as our own wallets. Here are some steps in the right direction.By Thomas LaRock Head Geek, SolarWinds, 12/23/20144 comments | Read | Post a Comment
TSA baggage scanners, evil USB sticks, and smart homes were among the targets in some of the most creative -- and yes, scary -- hacks this year by security researchers.By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/22/20148 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
InformationWeek 2014 Mobile Security SurveySecuring company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.