Making sense of data associated with customers, citizens and other individuals may seem simple, but it’s possible that the records don’t tell the real story.By Matthew Magne, SAS , 7/19/20170 comments | Read | Post a Comment
Cloud-based application development has taken big strides, and it's delivering benefits for enterprises such as federal agencies.By Charles Fullwood, Force 3 , 7/18/20170 comments | Read | Post a Comment
The EU's GDPR impacts all companies doing business with EU citizens. Here are some important steps to take to ensure you’re on the fast track to compliance.By Martin James, Regional Vice President, DataStax , 7/4/20170 comments | Read | Post a Comment
The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.By Kelly Sheridan Associate Editor, Dark Reading, 6/20/20171 Comment | Read | Post a Comment
A Cisco report claims $2.3 trillion is waiting to be realized through digitized services, city management; cites Houston, Oslo, Barcelona as examples. By Charles Babcock Editor at Large, Cloud, 6/16/20173 comments | Read | Post a Comment
When the General Data Protection Regulation (GDPR) takes effect in May 2018, a company’s ability to respond to a data breach will be paramount. By Ted Julian, VP of product management and Co-Founder, IBM Resilient , 6/15/20171 Comment | Read | Post a Comment
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/8/20171 Comment | Read | Post a Comment
Cloud Security Alliance sees danger, issues guidelines for how we'll need to secure the connected vehicle environment in the future.By Charles Babcock Editor at Large, Cloud, 5/26/20170 comments | Read | Post a Comment
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how. By Sara Peters Senior Editor at Dark Reading, 5/25/201714 comments | Read | Post a Comment
As computing power becomes increasingly distributed into the devices and infrastructure around us, the data generated by those devices will invariably play a larger role in our businesses and everyday lives. By Tim Bucher, Senior Vice President, Seagate Technology , 5/24/20170 comments | Read | Post a Comment
Google, Kaspersky Lab and Symantec all have found common code in the WannaCry malware and that of the nation-state hackers behind the mega breach of Sony.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/15/20172 comments | Read | Post a Comment
EO calls for immediate review of federal agencies' security postures, adoption of the NIST Framework, and a focus on critical infrastructure security.By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/20170 comments | Read | Post a Comment
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.
By Kelly Sheridan Associate Editor, Dark Reading, 4/24/20171 Comment | Read | Post a Comment
Steve Ballmer's new venture is striving to turn billions of bits of government data into facts.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 4/18/20173 comments | Read | Post a Comment
Navigating the maze of data sovereignty laws can be intimidating, organizations should not let this deter them from making the move if companies do their due diligence. By Allan Leinwand, ServiceNow CTO , 4/17/20170 comments | Read | Post a Comment
IoT security is essential for the Internet of Things to reach commercial success. Here's one way to protect this technology and data from hackers.By Jessica Davis Senior Editor, Enterprise Apps, 4/11/20175 comments | Read | Post a Comment
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.