Infrastructure // Network Security
News & Commentary
Heartbleed: Making The Case For SDN
Lori MacVittie,
Commentary
Software-defined networking technology could help protect against vulnerabilities like Heartbleed. It's time to develop a more mature SDN option.
By Lori MacVittie , 4/10/2014
Comment3 comments  |  Read  |  Post a Comment
Unisys Stealth Makes Sensitive Data Go Dark
Charles Babcock, Editor At Large, InformationWeek
News
Can you make data invisible to intruders? Unisys Stealth system creates a community around sensitive data and encrypts communications between all users.
By Charles Babcock Editor At Large, InformationWeek , 4/8/2014
Comment2 comments  |  Read  |  Post a Comment
VMware's Casado: Network Virtualization The Right Way
Susan Fogarty,
News
The true benefits from network virtualization come from simplifying the network and applying it to broader use cases, rather than bickering about vendors' SDN products, according to the CTO.
By Susan Fogarty , 4/8/2014
Comment0 comments  |  Read  |  Post a Comment
FTC Privacy Enforcement Power Wins Court Blessing
Thomas Claburn, Editor-at-Large
News
The agency's claim against Wyndham Hotels for poor data security practices has been allowed to proceed.
By Thomas Claburn Editor-at-Large, 4/8/2014
Comment0 comments  |  Read  |  Post a Comment
Will SDN Leave Network Engineers Jobless?
Marcia Savage, Managing Editor, Network Computing
News
Software-defined networking will shake up the network engineer career path, so plan now to broaden your skills, an Interop panel of experts advised.
By Marcia Savage Managing Editor, Network Computing, 4/7/2014
Comment1 Comment  |  Read  |  Post a Comment
HP Unleashes CloudSystem 8 For Private, Hybrid Clouds
Charles Babcock, Editor At Large, InformationWeek
News
HP's converged cloud system hits general availability to enable private clouds that work with VMware and hybrid clouds that rely on OpenStack.
By Charles Babcock Editor At Large, InformationWeek , 4/7/2014
Comment1 Comment  |  Read  |  Post a Comment
3 Trends Driving Big Data Breakthroughs: A CIO's View
Doug Henschen, Executive Editor, InformationWeek
News
GE Water & Power CIO says data blending, scalable storage and processing, and a maturing Internet of things are shaping big data progress.
By Doug Henschen Executive Editor, InformationWeek, 4/7/2014
Comment6 comments  |  Read  |  Post a Comment
VMware Touts Virtualization For Datacenter Security
Charles Babcock, Editor At Large, InformationWeek
News
Hypervisor-based security would be like Goldilocks -- "not too hot, not too cold" -- when it comes to halting malware and intruders well inside the enterprise perimeter, say VMware leaders at Interop.
By Charles Babcock Editor At Large, InformationWeek , 4/4/2014
Comment3 comments  |  Read  |  Post a Comment
Best of Interop 2014 Product Award Winners
Steven Hill,
News
The Best of Interop awards recognize innovation in nine categories, including networking, storage, cloud, and security.
By Steven Hill , 4/3/2014
Comment0 comments  |  Read  |  Post a Comment
Feds To Improve Threat Information Sharing
William Jackson, Technology Writer
News
Project Interoperability aims to develop and standardize formats for sharing security and threat information among organizations.
By William Jackson Technology Writer, 3/31/2014
Comment3 comments  |  Read  |  Post a Comment
Interop: Find The Fun
Susan Fogarty,
Commentary
Attending a technology conference can be hard work, but Interop is making fun an integral part of the agenda.
By Susan Fogarty , 3/27/2014
Comment2 comments  |  Read  |  Post a Comment
3 Survival Tips For Women In IT
Michele Chubirka, Security Professional; Host,
Commentary
The technology industry -- especially the networking field -- can be an awfully isolating place for a woman. I offer three ways to cope.
By Michele Chubirka Security Professional; Host, "Healthy Paranoia" Podcast, 3/26/2014
Comment1 Comment  |  Read  |  Post a Comment
Symantec Fires CEO In Surprise Move
Mathew J. Schwartz,
News
Analysts question security and storage giant's turnaround after the board fires its second CEO in two years.
By Mathew J. Schwartz , 3/21/2014
Comment10 comments  |  Read  |  Post a Comment
Greatest Moments In Interop History
Marcia Savage, Managing Editor, Network Computing
News
The Interop conference is a tradition for IT professionals. We look back on its dramatic growth and how it's changed.
By Marcia Savage Managing Editor, Network Computing, 3/20/2014
Comment2 comments  |  Read  |  Post a Comment
Many Businesses Fail To Disclose Data Breaches
Kelly Jackson Higgins, Senior Editor, Dark Reading
News
Only about 35% of businesses worldwide say they share attack and threat information with others in their industry, even though 77% admit to suffering from a cyberattack.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 3/19/2014
Comment2 comments  |  Read  |  Post a Comment
Linux Takeover Artists Fling 35M Spam Messages Daily
Mathew J. Schwartz,
News
"Operation Windigo" server takeover campaign controls 10,000 hacked servers, launches millions of spam, malware, and drive-by exploit kit attacks per day.
By Mathew J. Schwartz , 3/19/2014
Comment0 comments  |  Read  |  Post a Comment
The Corruption Of Agile Development
Andrew Binstock, Editor-in-chief, Dr. Dobb's Journal
News
What was intended as a set of personal practices has become a doctrine. And despite the mainstream adoption of Agile, the loss of its original intent has undermined its effectiveness.
By Andrew Binstock Editor-in-chief, Dr. Dobb's Journal, 3/19/2014
Comment0 comments  |  Read  |  Post a Comment
Voice, Proximity Key To Cutting
E-Payment Fraud
Pat Carroll, Executive Chairman & Founder, ValidSoft
Commentary
While we wait for EMV, US companies should lay the groundwork for strong security.
By Pat Carroll Executive Chairman & Founder, ValidSoft, 3/18/2014
Comment2 comments  |  Read  |  Post a Comment
Mainframe Brain Drain Raises Serious Concern
Kevin Casey,
News
As IT pros with deep mainframe know-how approach retirement age, a major skills gap may await enterprise CIOs that still rely on the decades-old technology.
By Kevin Casey , 3/17/2014
Comment32 comments  |  Read  |  Post a Comment
Lockheed Martin Acquires Cybersecurity Firm Industrial Defender
Elena Malykhina, Technology Journalist
News
Acquisition of critical infrastructure cyber-security firm gives Lockheed Martin access to commercial markets while offering government customers a fuller suite of services.
By Elena Malykhina Technology Journalist, 3/14/2014
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Steal Our Slides
2014 State of Storage Survey
2014 State of Storage Survey
If you look at vendor financials, the enterprise storage business seems stuck in neutral. Don't believe it.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.