InformationWeek News Connects The Business Technology Community
IoT
IoT
Defining IT Leadership: You Have a Brand New Job
Get Ready for the Analytics Bot Invasion
Is a
Why IT is in Jeopardy
Nemertes CIO Burke: Do You Know Your Cloud TCO?
News & Commentary
INTERPOL Operation Sweeps Up Thousands of Cybercrime Servers Used for Ransomware, DDoS, Spam
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Massive public-private 'cyber surge' in Asia identifies hundreds of compromised websites in operation that spans multiple cybercriminal groups, activities.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/25/2017
Comment0 comments  |  Read  |  Post a Comment
Let's Talk Cloud at Interop ITX
Charles Babcock, Editor at Large, Cloud
Satire
You can join cloud computing expert and InformationWeek editor at large Charles Babcock as he takes in his pick of more than two dozen informative cloud related presentations at the upcoming Interop ITX in May.
By Charles Babcock Editor at Large, Cloud, 4/25/2017
Comment0 comments  |  Read  |  Post a Comment
Which Comes First: DevOps or Culture Change?
Eric Bruno, Lead real-time engineer at Perrone Robotics
Satire
Building a culture of DevOps extends beyond the development, operations, and QA teams.
By Eric Bruno Lead real-time engineer at Perrone Robotics, 4/25/2017
Comment0 comments  |  Read  |  Post a Comment
A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins
Kelly Sheridan, Associate Editor, Dark Reading
News
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.
By Kelly Sheridan Associate Editor, Dark Reading, 4/24/2017
Comment0 comments  |  Read  |  Post a Comment
9 Big Mistakes DevOps Teams Make
Cynthia Harvey, Contributor, NetworkComputing
Satire
There are plenty of benefits to be gained from a move to DevOps, but here are some mistakes that you really want to avoid so you can get those benefits.
By Cynthia Harvey Contributor, NetworkComputing, 4/24/2017
Comment0 comments  |  Read  |  Post a Comment
Russian Citizen Gets Record 27-Year Sentence for Hacking, Fraud Scheme
Dark Reading Staff,
News
Roman Valeryevich gets 27 years for hacking PoS machines. Meanwhile, spam master Pyotr Levashov's indictment is unsealed.
By Dark Reading Staff , 4/21/2017
Comment0 comments  |  Read  |  Post a Comment
Exploits Targeting Corporate Users Surged Nearly 30% In 2016
Jai Vijayan, Freelance writer
News
At same time, number of attacks targeting software vulnerabilities in systems used by consumers declined over 20%, Kaspersky Lab says in new report.
By Jai Vijayan Freelance writer, 4/21/2017
Comment0 comments  |  Read  |  Post a Comment
Why IT is in Jeopardy
Lisa Morgan, Freelance Writer
Satire
Change is the only constant, which IT professionals know all too well. However, as technology changes, their departments must too. Some IT departments are in trouble, big trouble if they don't do something fast. We explain a few reasons why.
By Lisa Morgan Freelance Writer, 4/21/2017
Comment0 comments  |  Read  |  Post a Comment
5 Keys to Leading in the Age of Analytics
Guest Commentary, Guest Commentary
Commentary
Organizations of all sizes have to consider the use of big data analytics, and understand how analytics fits into the corporate strategy.
By Andrew Wells and Kathy Chiang , 4/20/2017
Comment1 Comment  |  Read  |  Post a Comment
Users Overshare Sensitive Enterprise Data
Dawn Kawamoto, Associate Editor, Dark Reading
News
Survey finds nearly half of the employees trained to protect sensitive data engage in risky security practices.
By Dawn Kawamoto Associate Editor, Dark Reading, 4/20/2017
Comment0 comments  |  Read  |  Post a Comment
Walmart: Agility Enabled with React.js, Node.js
Charles Babcock, Editor at Large, Cloud
News
Alex Grigoryan needed to attack multiple fronts as he revamped the Walmart Web site; the answer was decentralized agile teams with Node.js.
By Charles Babcock Editor at Large, Cloud, 4/20/2017
Comment0 comments  |  Read  |  Post a Comment
3 Tips for Updating an Endpoint Security Strategy
Kelly Sheridan, Associate Editor, Dark Reading
News
How to face the process of navigating new threats, tools, and features to build an effective endpoint security strategy.
By Kelly Sheridan Associate Editor, Dark Reading, 4/19/2017
Comment1 Comment  |  Read  |  Post a Comment
Continuous Delivery: 7 Hard-Earned Lessons for Getting it Right
Guest Commentary, Guest Commentary
Commentary
As organizations move toward continuous integration and delivery of applications there are multiple ways in which things can go wrong.
By Russell Smith, CTO of Rainforest , 4/19/2017
Comment1 Comment  |  Read  |  Post a Comment
Should Your Company Go Mobile-First?
Guest Commentary, Guest Commentary
Commentary
It's decision time for enterprises as an increasingly mobile workforce needs anytime, anywhere access to ERP systems.
By Daan Pepijn, Security and ERP Consultant , 4/19/2017
Comment0 comments  |  Read  |  Post a Comment
Join Dark Reading for a 4/20 Twitter Chat on AppSec
Dark Reading Staff,
Commentary
The @DarkReading team will host a conversation about application security on 4/20 at 2 p.m. ET.
By Dark Reading Staff , 4/19/2017
Comment0 comments  |  Read  |  Post a Comment
Nemertes CIO Burke: Do You Know Your Cloud TCO?
Charles Babcock, Editor at Large, Cloud
Satire
It's not simple: Nemertes CIO John Burke to explain how to evaluate your TCO when using a cloud service and whether real savings are available.
By Charles Babcock Editor at Large, Cloud, 4/19/2017
Comment0 comments  |  Read  |  Post a Comment
Finding Just the Facts in Government Data
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
Steve Ballmer's new venture is striving to turn billions of bits of government data into facts.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 4/18/2017
Comment3 comments  |  Read  |  Post a Comment
How Top Security Execs are Doing More with Less
Dark Reading Staff,
Commentary
Even the largest corporations aren't immune to the cybersecurity skills gap – an inside look at how they are coping and adjusting.
By Dark Reading Staff , 4/18/2017
Comment3 comments  |  Read  |  Post a Comment
3 Cool AI Projects
Lisa Morgan, Freelance Writer
Commentary
Are you ready for AI and machine learning? Here's an overview of three use cases to give you a flavor of just what is possible.
By Lisa Morgan Freelance Writer, 4/18/2017
Comment0 comments  |  Read  |  Post a Comment
Data & Analytics: Solve Your Top Challenges at Interop ITX
Jessica Davis,  Senior Editor, Enterprise Apps
Satire
Looking to solve your data & analytics challenges? Our Interop ITX experts have the answers. Here are some of the take-aways you can expect by attending these sessions.
By Jessica Davis Senior Editor, Enterprise Apps, 4/18/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Commentary
5 Keys to Leading in the Age of Analytics
Guest Commentary, Guest Commentary,  4/20/2017
Commentary
IT Jobs in Jeopardy: 5 Steps to Protect Yours
Guest Commentary, Guest Commentary,  4/11/2017
News
Walmart: Agility Enabled with React.js, Node.js
Charles Babcock, Editor at Large, Cloud,  4/20/2017
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
The Importance of the Partner Ecosystem in Your Storage Solution
Relying on a vendor that appreciates and fuels the symbiotic relationship between upstream and downstream communities can pay strong dividends to those investing in today's storage solutions. Read >>
Partner Perspectives
What's This?
White Papers
Current Issue
IT Success = Storage & Data Center Performance
Balancing legacy infrastructure with emerging technologies requires laying a solid foundation that delivers flexibility, scalability, and efficiency. Learn what the most pressing issues are, how to incorporate advances like software-defined storage, and strategies for streamlining the data center.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Flash Poll