IoT
Windows 10 At 1 Year: 9 Ways It's Changed
DNC Hack Serves As Cautionary Tale For IT Pros
How To Keep IT Moving At The Speed Of Business
Enterprises Are Poorly Equipped To Handle External Cyberattacks
Verizon Buying Yahoo's Web Business For $4.8 Billion
News & Commentary
BlackBerry DTEK50 Android Smartphone Images Leaked
Eric Zeman,
Commentary
BlackBerry's next Android device is no BlackBerry, it's a re-badged as the Alcatel Idol 4.
By Eric Zeman , 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
Apple Taps Bob Mansfield To Lead Project Titan
Nathan Eddy, Freelance Writer
News
Bob Mansfield, the veteran Apple hardware engineer, is returning to Apple to lead Project Titan, widely believed to be the company's self-driving electric vehicle initiative.
By Nathan Eddy Freelance Writer, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
In Security, Know That You Know Nothing
Michael Sutton, Chief Information Security Office, Zscaler
Commentary
Only when security professionals become aware of what they don’t know, can they start asking the right questions and implementing the right security controls.
By Michael Sutton Chief Information Security Office, Zscaler, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
Teradata Acquires London-Based Big Data Partnership
Jessica Davis,  Senior Editor, Enterprise Apps
News
Data warehouse and analytics company Teradata has added to its training and consulting bench with the acquisition of Big Data Partnership, a London-based startup that should also extend the company's global reach.
By Jessica Davis Senior Editor, Enterprise Apps, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
Security Holes Exposed In Smart Lighting System
Steve Zurier, Freelance Writer
News
Sylvania Osram Lightify vulnerabilities could allow an attacker to turn out the lights or ultimately infiltrate the corporate network.
By Steve Zurier Freelance Writer, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
'MouseJack' Researchers Uncover Major Wireless Keyboard Vulnerability
Ericka Chickowski, Contributing Writer, Dark Reading
News
KeySniffer attack shows two-thirds of low-cost wireless keyboards prone to keystroke capture and malicious keystroke injection.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
DNC Hack Serves As Cautionary Tale For IT Pros
Kelly Sheridan, Associate Editor, InformationWeek
News
Following the high-profile hack of the Democratic National Committee's computer system, cyber-security experts emphasize the importance of secure email correspondence.
By Kelly Sheridan Associate Editor, InformationWeek, 7/26/2016
Comment1 Comment  |  Read  |  Post a Comment
Enterprises Are Poorly Equipped To Handle External Cyberattacks
Kelly Sheridan, Associate Editor, InformationWeek
News
Most organizations lack the tools and processes to handle external cyberattacks -- which lie outside a company's firewalls. Such attacks primarily leverage digital channels, and responsibility for monitoring these channels often falls outside traditional IT and security functions.
By Kelly Sheridan Associate Editor, InformationWeek, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
SentinelOne Offers $1 Million Guarantee To Stop Ransomware
Sara Peters, Senior Editor at Dark Reading
News
Jeremiah Grossman continues his crusade to make security vendors take responsibility for their own gear.
By Sara Peters Senior Editor at Dark Reading, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
8 iOS, Android Apps To Help Get Your Errands Done
Kelly Sheridan, Associate Editor, InformationWeek
News
For IT professionals, like others with demanding jobs, finding the time for the mundane tasks of everyday life can be a challenge. Here are 8 iOS and Android apps created to help you save time on chores and errands so you have more hours in the day.
By Kelly Sheridan Associate Editor, InformationWeek, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
New Portal Offers Decryption Tools For Some Ransomware Victims
Jai Vijayan, Freelance writer
News
Nomoreransom.org, a joint initiative between Europol, the Dutch National Police, Kaspersky Lab and Intel Security, offers help in getting encrypted data back.
By Jai Vijayan Freelance writer, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
10 Hottest Talks at Black Hat USA 2016
Sean Martin, CISSP | President, imsmartin
News
The impressive roll call of speakers offers a prime opportunity to learn from the very best of the information security world.
By Sean Martin CISSP | President, imsmartin, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Google Maps Gains WiFi-Only Mode, Transit Alerts
Eric Zeman,
Commentary
People will soon be able to put Google Maps into WiFi mode in order to cut down on cellular data use.
By Eric Zeman , 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Ford's SYNC 3 Brings Android Auto, CarPlay To All Models
Nathan Eddy, Freelance Writer
News
Ford is making the SYNC 3 platform available on all of its 2017 model-year vehicles, with a host of popular applications on tap. It's also a huge opportunity for Google's Android Auto and Apple's CarPlay platforms.
By Nathan Eddy Freelance Writer, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Verizon Buying Yahoo's Web Business For $4.8 Billion
Dawn Kawamoto, Freelance Writer and Editor
News
The telecommunications giant strikes a deal to acquire Yahoo's core internet assets, ending a drawn-out process for one of the early dot-com darlings.
By Dawn Kawamoto Freelance Writer and Editor, 7/25/2016
Comment2 comments  |  Read  |  Post a Comment
Gartner Sees $1 Trillion Shift In IT Spending To Cloud
Charles Babcock, Editor at Large, Cloud
News
The shift in IT spending from traditional hardware and software to cloud computing will continue over the next five years. The transfer will total $1 trillion, according to Gartner.
By Charles Babcock Editor at Large, Cloud, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
How To Keep IT Moving At The Speed Of Business
Andrew Horne, IT Practice Leader, CEB
Commentary
Andrew Horne, IT practice leader at consulting firm CEB, offers his insights on why IT needs to speed up its processes in today's business environment. Horne uses data from CEB research, and examples from client experiences, to give you three steps that can help you speed up IT operations in your own organization.
By Andrew Horne IT Practice Leader, CEB, 7/25/2016
Comment2 comments  |  Read  |  Post a Comment
Three Arrested For Cell Phone Hacking Scam
Dark Reading Staff,
News
Defendants accused of using stolen phone details to make international calls charged to victims’ accounts.
By Dark Reading Staff , 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Lawsuit Raises Questions About The Right To Tinker With Tech
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Electronic Frontier Foundation has filed a lawsuit to overturn a provision in the Digital Millennium Copyright Act which limits the modification of technology. For anyone managing information technology, the law in question has the potential to limit access to data, to weaken security, and to impose unnecessary burdens, costs, and liabilities.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
Building Black Hat: Locking Down One Of The World’s Biggest Security Conferences
Aamir Lakhani, Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced Labs
Commentary
For security pros, being asked to help secure Black Hat is like being asked to play on the Olympic basketball team.
By Aamir Lakhani Senior Security Strategist & Hacker, Fortinet, FortiGuard Advanced Labs, 7/25/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
10 Agile Tips From Pokémon Go Coach Training
Curtis Franklin Jr., Executive Editor, Technical Content,  7/24/2016
Apollo 11 Moon Mission Images Still Stun After 47 Years
Nathan Eddy, Freelance Writer,  7/22/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of July 17, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."