Although the first edition of Google Glass didn't take off, the company is retooling the device for specialty industries such as healthcare and energy.By Nathan Eddy Freelance Writer, 8/1/20151 Comment | Read | Post a Comment
A new agreement by IBM and CVS will use Watson to better manage patient care. However, there are a few concerns about privacy. By Larry Loeb Blogger, Informationweek, 7/30/20157 comments | Read | Post a Comment
Users of Google Compute Engine can now provide their own keys to secure data, turning Infrastructure-as-a-Service (IaaS) into even more of a self-service affair.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/28/20152 comments | Read | Post a Comment
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/20156 comments | Read | Post a Comment
Katherine Archuleta, the director of the Office of Personnel Management, is the latest casualty of a data breach, but she's certainly not the only one. There's no job security when your job is security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/14/20152 comments | Read | Post a Comment
The Senate Judiciary Committee heard a different story from technologists, who argue that surveillance has never been easier.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/8/20154 comments | Read | Post a Comment
Super-intelligent robots deserve some concern, but really we should be paying more attention to the people and processes involved in building our machines.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/3/20156 comments | Read | Post a Comment
It's no longer acceptable for businesses to play the victim when cybercrime strikes. Companies of all sizes must take action.By Sean McGrath Freelance IT Writer, 6/11/20151 Comment | Read | Post a Comment
Smartwatches account for only one quarter of wearables shipped during the first three months of the year, according to IDC. Can the Apple Watch change that?By Eric Zeman , 6/3/20153 comments | Read | Post a Comment
Flaws in Google’s Android operating system mean the factory-reset option is unlikely to permanently wipe all your data -- or master token -- from the device.By Nathan Eddy Freelance Writer, 5/25/20153 comments | Read | Post a Comment
Palm vein scans are helping staff pull up patient records more efficiently and securely. One of eight Elite 100 Business Innovation award winners. By Curtis Franklin Jr. Executive Editor, Technical Content, 4/28/20151 Comment | Read | Post a Comment
Apple's ResearchKit is an open-source framework designed for the healthcare and fitness markets as a way to collect data and analyze larger groups of patients. By Nathan Eddy Freelance Writer, 4/15/20153 comments | Read | Post a Comment
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices.By Liviu Arsene Senior E-threat Analyst, Bitdefender, 4/10/20153 comments | Read | Post a Comment
Early testers of the Apple Watch suggest it is the best smartwatch yet, but they admit that people don't necessarily need smartwatches. That is, at least not yet.By Eric Zeman , 4/8/20156 comments | Read | Post a Comment
Join us for a roundup of the biggest stories from a big week at InformationWeek.com for the week of Feb. 1.By Curtis Franklin Jr. Executive Editor, Technical Content, 2/5/20151 Comment | Read | Post a Comment
CloudPassage CTO Amrit Williams details five steps to achieve a level of cloud security that goes beyond mere compliance.By Amrit Williams CTO, Cloud Passage, 1/29/20150 comments | Read | Post a Comment
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Healthcare Data Breaches Cost More Than You ThinkHealthcare providers just don't get it. They refuse to see the need to fully secure their protected health information from unauthorized users -- and from authorized users who abuse their access privileges. As a result, they don't allocate enough budgetary resources for securing medical data.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.