The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.By Kelly Sheridan Associate Editor, Dark Reading, 6/20/20171 Comment | Read | Post a Comment
A Cisco report claims $2.3 trillion is waiting to be realized through digitized services, city management; cites Houston, Oslo, Barcelona as examples. By Charles Babcock Editor at Large, Cloud, 6/16/20171 Comment | Read | Post a Comment
When the General Data Protection Regulation (GDPR) takes effect in May 2018, a company’s ability to respond to a data breach will be paramount. By Ted Julian, VP of product management and Co-Founder, IBM Resilient , 6/15/20171 Comment | Read | Post a Comment
Former CIA head said retaliatory hacking options 'actively being discussed in government circles.'By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/20170 comments | Read | Post a Comment
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/8/20171 Comment | Read | Post a Comment
Cloud Security Alliance sees danger, issues guidelines for how we'll need to secure the connected vehicle environment in the future.By Charles Babcock Editor at Large, Cloud, 5/26/20170 comments | Read | Post a Comment
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how. By Sara Peters Senior Editor at Dark Reading, 5/25/201714 comments | Read | Post a Comment
As computing power becomes increasingly distributed into the devices and infrastructure around us, the data generated by those devices will invariably play a larger role in our businesses and everyday lives. By Tim Bucher, Senior Vice President, Seagate Technology , 5/24/20170 comments | Read | Post a Comment
Google, Kaspersky Lab and Symantec all have found common code in the WannaCry malware and that of the nation-state hackers behind the mega breach of Sony.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/15/20172 comments | Read | Post a Comment
EO calls for immediate review of federal agencies' security postures, adoption of the NIST Framework, and a focus on critical infrastructure security.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/20170 comments | Read | Post a Comment
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.
By Kelly Sheridan Associate Editor, Dark Reading, 4/24/20171 Comment | Read | Post a Comment
Steve Ballmer's new venture is striving to turn billions of bits of government data into facts.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 4/18/20173 comments | Read | Post a Comment
Navigating the maze of data sovereignty laws can be intimidating, organizations should not let this deter them from making the move if companies do their due diligence. By Allan Leinwand, ServiceNow CTO , 4/17/20170 comments | Read | Post a Comment
IoT security is essential for the Internet of Things to reach commercial success. Here's one way to protect this technology and data from hackers.By Jessica Davis Senior Editor, Enterprise Apps, 4/11/20175 comments | Read | Post a Comment
Governments have an opportunity to continue as leaders in innovation, but that role may require some changes in the leadership mindset and strategy. By Gaurav Gujral, Accenture , 4/10/20170 comments | Read | Post a Comment
Have you ever considered how state and local government IT departments differ from yours? The challenges are unique, the solutions creative, and the lessons learned could help the private sector more effectively assess and enhance the state of their own IT. By Doug Hazelman, vice president, Veeam Software , 4/4/20170 comments | Read | Post a Comment
Russian intelligence officials hired renowned cybercriminals to do their bidding in massive hacks that compromised Yahoo, Gmail, and other email accounts of millions of people in the US, Russia, elsewhere.By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/15/20174 comments | Read | Post a Comment
Learn about how real-world enterprise organizations are advancing projects in AI, machine learning, virtual reality, and more, to add value for consumers and drive revenues.By Jessica Davis Senior Editor, Enterprise Apps, 3/14/20172 comments | Read | Post a Comment
HTTPS and DNSSEC not used across the board on agency websites despite federal requirements to do so.By Steve Zurier Freelance Writer, 3/9/20170 comments | Read | Post a Comment
If you are wondering what to do to prepare for the EU's GDPR, the best advice is simply logical.By Todd Ruback, Chief Privacy Officer, Evidon , 3/8/20170 comments | Read | Post a Comment
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.