IoT
IoT
InformationWeek 2016 Salary Survey: 10 Best-Paying IT Leadership Jobs
Beer Giant Taps Salesforce Data For Better Customer Relations
Tech And Tasers: IT Support In Washington's Prison System
Low-Code Development Pays Off For Commodities Exchange
Cloud Computing Embraced As Cost-Cutting Measure
News & Commentary
6 Steps To Successful Continuous Deployment Transition
Curtis Franklin Jr., Executive Editor, Technical Content
News
Agile methodologies and DevOps can lay the foundation for continuous deployment, but there are several organizational, cultural, and technological changes that have to occur before they can be put into play. Here are six vital steps to take in your journey toward successful continuous deployment.
By Curtis Franklin Jr. Executive Editor, Technical Content, 9/30/2016
Comment0 comments  |  Read  |  Post a Comment
Researchers Shoot Down Yahoo Claim Of Nation-State Hack
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
InfoArmor says the attackers who stole a half-billion Yahoo user accounts were seasoned cybercriminals who later sold the booty to an Eastern European nation-state.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Cloud Computing Embraced As Cost-Cutting Measure
Scott Ferguson, Director of Audience Development, UBM Tech
News
When it comes to implementing a cloud infrastructure, whether it's public, private, or hybrid, most IT departments view the technology as a way to cut costs and save money, according to a recent analysis from CompTIA. The report also shows that SaaS is seen as the most useful cloud service.
By Scott Ferguson Director of Audience Development, UBM Tech, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Low-Code Development Pays Off For Commodities Exchange
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
The CME Group, owner and operator of the world's largest derivatives marketplaces, has moved to a low-code platform for business process management.
By Curtis Franklin Jr. Executive Editor, Technical Content, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Fear & Loathing In The Cloud
Tim Prendergast, Founder & CEO, Evident.io
Commentary
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
By Tim Prendergast Founder & CEO, Evident.io, 9/29/2016
Comment2 comments  |  Read  |  Post a Comment
Tech And Tasers: IT Support In Washington's Prison System
Susan Nunziata, Editorial Director
Commentary
The 185 IT professionals at the Washington Department of Corrections support the needs of approximately 8,000 corrections officers and staffers and track some 33,000 assets -- including everything from iPhones to Tasers. Here's the story of how the organization revamped its IT support and service management tools and processes -- and the surprising culture changes that came about as a result.
By Susan Nunziata Editorial Director, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
BlackBerry Quits Making Smartphones
Scott Ferguson, Director of Audience Development, UBM Tech
News
BlackBerry, which dominated the mobile market during the dawn of the smartphone era, is no longer making hardware. Instead, it will focus on software, management, and security, which moves the company deeper into the enterprise.
By Scott Ferguson Director of Audience Development, UBM Tech, 9/28/2016
Comment2 comments  |  Read  |  Post a Comment
Hacking The Polls: Where US Voting Processes Fall Short
Jeff Schilling, Chief of Operations and Security, Armor
Commentary
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
By Jeff Schilling Chief of Operations and Security, Armor, 9/28/2016
Comment5 comments  |  Read  |  Post a Comment
More Than Half Of IT Pros Employ Insecure Data Wiping Methods
Emily Johnson, Associate Editor, UBM Americas
News
Recent study shows most enterprise IT professionals incorrectly believe emptying a Recycle Bin or reformatting a computer drive permanently erases data.
By Emily Johnson Associate Editor, UBM Americas, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Beer Giant Taps Salesforce Data For Better Customer Relations
Charles Babcock, Editor at Large, Cloud
News
Anheuser-Busch InBev, owner of more than 200 beer brands, needed a single platform for different customers and brewed up one on Salesforce.
By Charles Babcock Editor at Large, Cloud, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Improving The Security Conversation For CIOs, CISOs, & Board Members
Kelly Sheridan, Associate Editor, InformationWeek
News
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts.
By Kelly Sheridan Associate Editor, InformationWeek, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
InformationWeek 2016 Salary Survey: 10 Best-Paying IT Leadership Jobs
Susan Nunziata, Editorial Director
News
In 2016, median base salary for IT management professionals -- including CIOs, CTOs, and VPs -- is $112,000 annually, and has remained flat in the past 12 months. Of course, certain management roles are commanding a much higher compensation package than the median, and we're highlighting 10 of them here. See how your compensation stacks up.
By Susan Nunziata Editorial Director, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment2 comments  |  Read  |  Post a Comment
Scalable IoT Deployments Gain Momentum, IDC Finds
Scott Ferguson, Director of Audience Development, UBM Tech
News
Despite security and cost concerns, businesses and their IT teams are moving forward on practical deployments of internet of things technologies, according to a survey from IDC. The report reinforces other recent findings about IoT and what IT needs to know.
By Scott Ferguson Director of Audience Development, UBM Tech, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Emerging Security Vendors To Watch
Kelly Sheridan, Associate Editor, InformationWeek
News
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
By Kelly Sheridan Associate Editor, InformationWeek, 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Top 125 Vendors To Watch
InformationWeek Staff,
Commentary
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
By InformationWeek Staff , 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Yahoo Confirms August Data Dump Issue Unrelated To Breach Of 500 Million Users
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
No 'connection' between August 2016 data dump claims and 2014 nation-state attack, company says.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Data Management Vendors Worth Watching
Jessica Davis,  Senior Editor, Enterprise Apps
Commentary
More data, more types of data, and the need to leverage it all to create more business value -- those are some of the drivers behind enterprise adoption of master data management platforms.
By Jessica Davis Senior Editor, Enterprise Apps, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 DevOps Vendors Worth Watching
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
DevOps depends on automated deployment tools and products that support practices such as continuous development, deployment, and improvement of enterprise software. Here's a look at vendors and their tools to know if you are making a move to DevOps.
By Curtis Franklin Jr. Executive Editor, Technical Content, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Mobile Fraud Changes Outlook for Multifactor Authentication
Stephen Maloney, Executive VP, Business Development & Strategy, Acuant
Commentary
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
By Steve Maloney , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Slideshows
InformationWeek 2016 Salary Survey: 10 Best-Paying IT Jobs
Susan Nunziata, Editorial Director,  9/23/2016
News
IT, Dev Boot Camps Help Kick-Start Careers
Jessica Davis, Senior Editor, Enterprise Apps,  9/23/2016
Slideshows
6 Reasons Bimodal IT Is Wrong For You
Curtis Franklin Jr., Executive Editor, Technical Content,  9/21/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio