IoT
8 iOS, Android Apps To Help Get Your Errands Done
Using AI To Fight Cyberthreats
Tableau 10 Puts Control Back In IT Hands
Tesla Unveils Gigafactory As Production Ramps Up
Office 365 Updates Add Machine Learning To Apps
News & Commentary
iPhone, iPad Sales Continue To Slow, Apple's Earnings Drop
Eric Zeman,
Commentary
Despite on-going declines in iPhone and iPad sales, Apple CEO Tim Cook says he remains hopeful and that the company continues to invest significantly in R&D.
By Eric Zeman , 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
The Internet Of Tiny Things: What Lurks Inside
Dan Cuddeford, Director of Sales Engineering, Wandera
Commentary
Hackers can now use a tiny $2 embedded chip -- at scale -- to launch thousands of infected 'things' out into the ether to capture data and soften consumers up for an attack.
By Dan Cuddeford Director of Sales Engineering, Wandera, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Tesla Unveils Gigafactory As Production Ramps Up
Nathan Eddy, Freelance Writer
News
The partial opening of Tesla's Gigafactory will give the electric car manufacturer the ability to make the majority of components under one roof, including lithium ion batteries.
By Nathan Eddy Freelance Writer, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Vixie’s Farsight Rolls Out Its First Enterprise DNS Security Service
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
DNS expert aims for proactive protection, defense of organizations' online domains.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Tableau 10 Puts Control Back In IT Hands
Jessica Davis,  Senior Editor, Enterprise Apps
News
Data visualization platform provider Tableau is updating its flagship product with new features that give oversight and data governance control back to IT organizations. It also makes a host of new advanced analytics capabilities accessible to more users.
By Jessica Davis Senior Editor, Enterprise Apps, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Skills Shortage Puts Organizations At Risk, Study Shows
Emily Johnson, Associate Editor, UBM Americas
News
The oft-discussed and lamented cybersecurity skills gap isn’t just a hiring issue, it’s putting your organization at risk, Intel Security-CSIS study finds.
By Emily Johnson Associate Editor, UBM Americas, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Using AI To Fight Cyberthreats
Thomas Claburn, Editor at Large, Enterprise Mobility
News
SparkCognition, working with Carnegie Mellon and IBM's Watson, aims to provide cyber-security researchers with better threat data using predictive models powered by machine learning.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
12 Types Of Data IT Can't Afford To Overlook
Lisa Morgan, Freelance Writer
News
Regardless of how much data your company has -- and how much your business leaders are asking for -- you're likely missing some hidden gems. Here are 12 examples of what you might be overlooking, and why it matters to IT professionals, and to your business at large.
By Lisa Morgan Freelance Writer, 7/27/2016
Comment0 comments  |  Read  |  Post a Comment
Obama Issues Federal Government Policy For Cyberattack Response
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
New Presidential Policy Directive, PPD-41, solidifies just how key federal agencies coordinate, respond to cyberattacks on federal and private networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/26/2016
Comment1 Comment  |  Read  |  Post a Comment
Office 365 Updates Add Machine Learning To Apps
Dawn Kawamoto, Freelance Writer and Editor
News
Microsoft is infusing more of its machine learning into Office 365 and adding in greater capabilities into Word, PowerPoint, and Outlook.
By Dawn Kawamoto Freelance Writer and Editor, 7/26/2016
Comment2 comments  |  Read  |  Post a Comment
BlackBerry DTEK50 Android Smartphone Images Leaked
Eric Zeman,
Commentary
BlackBerry's next Android device is no BlackBerry, it's a re-badged as the Alcatel Idol 4.
By Eric Zeman , 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
Apple Taps Bob Mansfield To Lead Project Titan
Nathan Eddy, Freelance Writer
News
Bob Mansfield, the veteran Apple hardware engineer, is returning to Apple to lead Project Titan, widely believed to be the company's self-driving electric vehicle initiative.
By Nathan Eddy Freelance Writer, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
In Security, Know That You Know Nothing
Michael Sutton, Chief Information Security Office, Zscaler
Commentary
Only when security professionals become aware of what they don’t know, can they start asking the right questions and implementing the right security controls.
By Michael Sutton Chief Information Security Office, Zscaler, 7/26/2016
Comment7 comments  |  Read  |  Post a Comment
Teradata Acquires London-Based Big Data Partnership
Jessica Davis,  Senior Editor, Enterprise Apps
News
Data warehouse and analytics company Teradata has added to its training and consulting bench with the acquisition of Big Data Partnership, a London-based startup that should also extend the company's global reach.
By Jessica Davis Senior Editor, Enterprise Apps, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
Security Holes Exposed In Smart Lighting System
Steve Zurier, Freelance Writer
News
Sylvania Osram Lightify vulnerabilities could allow an attacker to turn out the lights or ultimately infiltrate the corporate network.
By Steve Zurier Freelance Writer, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
'MouseJack' Researchers Uncover Major Wireless Keyboard Vulnerability
Ericka Chickowski, Contributing Writer, Dark Reading
News
KeySniffer attack shows two-thirds of low-cost wireless keyboards prone to keystroke capture and malicious keystroke injection.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
DNC Hack Serves As Cautionary Tale For IT Pros
Kelly Sheridan, Associate Editor, InformationWeek
News
Following the high-profile hack of the Democratic National Committee's computer system, cyber-security experts emphasize the importance of secure email correspondence.
By Kelly Sheridan Associate Editor, InformationWeek, 7/26/2016
Comment4 comments  |  Read  |  Post a Comment
Enterprises Are Poorly Equipped To Handle External Cyberattacks
Kelly Sheridan, Associate Editor, InformationWeek
News
Most organizations lack the tools and processes to handle external cyberattacks -- which lie outside a company's firewalls. Such attacks primarily leverage digital channels, and responsibility for monitoring these channels often falls outside traditional IT and security functions.
By Kelly Sheridan Associate Editor, InformationWeek, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
SentinelOne Offers $1 Million Guarantee To Stop Ransomware
Sara Peters, Senior Editor at Dark Reading
News
Jeremiah Grossman continues his crusade to make security vendors take responsibility for their own gear.
By Sara Peters Senior Editor at Dark Reading, 7/26/2016
Comment0 comments  |  Read  |  Post a Comment
8 iOS, Android Apps To Help Get Your Errands Done
Kelly Sheridan, Associate Editor, InformationWeek
News
For IT professionals, like others with demanding jobs, finding the time for the mundane tasks of everyday life can be a challenge. Here are 8 iOS and Android apps created to help you save time on chores and errands so you have more hours in the day.
By Kelly Sheridan Associate Editor, InformationWeek, 7/26/2016
Comment2 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
Verizon Buying Yahoo's Web Business For $4.8 Billion
Dawn Kawamoto, Freelance Writer and Editor,  7/25/2016
10 Agile Tips From Pokémon Go Coach Training
Curtis Franklin Jr., Executive Editor, Technical Content,  7/24/2016
DNC Hack Serves As Cautionary Tale For IT Pros
Kelly Sheridan, Associate Editor, InformationWeek,  7/26/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of July 17, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."