InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States
Our Website:

Latest Content From InformationWeek

Research Report: 2016: IT Salary Survey Report

by InformationWeekOct 26, 2017

Wondering what the going rate is for your current job and if your pay is at or up to par? Are you curious how much to ask for when looking for a new gig? Check out the InformationWeek's 2016 US IT Salary Survey and find out!

Digital Editorial Content: Digital Transformation Myths & Truths

by InformationWeekSep 12, 2017

Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.


  • Learn how to set realistic goals in terms of how and what need to be transformed in your environment
  • Discover the major steps required to move your company to a digitally transformed state
  • Explore strategies for changing the culture mindset and achieving progress in an organization
  • And more.

Digital Editorial Content: IT Strategies to Conquer the Cloud

by InformationWeekJun 22, 2017

InformationWeek's June Trend Report explores enterprise adoption of cloud computing and its impact on internal IT and network operations.

• Learn about the top skills IT professionals need to keep up with the move to cloud and maximize their effectiveness
• Hear practical tips IT operations can take can ensure smooth cloud adoption and migration
• Learn strategies to prevent cloud services from adversely affecting network performance
• And more.

Digital Editorial Content: IT Success = Storage & Data Center Performance

by InformationWeekMay 22, 2017

This InformationWeek Trend Report explores integrating emerging technologies with legacy enterprise infrastructure.


  • Hear about the top challenges that face IT and infrastructure executives today
  • Learn how software-defined storage can benefit your environment without introducing complexity
  • Find out how much you can save by eliminating underutilized resources in the data center
  • And more!

Digital Editorial Content: Top IT Trends to Watch in Financial Services

by InformationWeekJul 08, 2016

Download this InformationWeek Tech Digest to learn about the Financial Services IT Trends you need to know about today!


  • How Peer-to-Peer Lending Is Rewriting Tech Rules: Peer-to-peer financial services marketplaces are changing how lenders operate, permanently altering the way financial services firms use information technology in the process.
  • Capital One -- Think Like a Designer, Work Like a Startup: The creation of Capital One Wallet is an example of how a large financial services IT organization can move like a startup and think like a design firm, transforming business expectations in the process.
  • Attacks Heighten Concerns About Financial Services Cybersecurity: Security, performance, agility, and compliance continue to be primary concerns for network administrators in the financial services industry.
  • Financial Services Networks: What's Top of Mind? Security, performance, agility, and compliance continue to be primary concerns for network administrators in the financial services industry.

The information submitted is collected by both UBM and our sponsors. Click here to view our Avere Systems, and Citrix's privacy policies.

This digital issue is sponsored by:

Digital Editorial Content: InformationWeek Elite 100 Tech Digest

by InformationWeekMay 03, 2016

Download this InformationWeek's 2016 Elite 100 special issue, highlighting the leading business technology innovators.


  • Our No. 1 Company: Capital One Financial's IT group thinks like a design firm, works like a startup, and transforms business in the process.
  • Other Companies in the Top Five: Learn about business technology innovation at The Weather Company, Horizon Blue Cross Blue Shield of New Jersey, Penn Medicine, and FedEx Services.
  • The Elite 100 Ranking: Find the 28th annual ranking of the leading US users of business technology in this issue.
  • Business Innovation Award Winners: Ten organizations lead the way this year in security, cloud, mobile, analytics, and more.
  • Decade Award Winners: Discover the 10 companies that have consistently demonstrated IT innovation over the past decade.

The information submitted is collected by both UBM and our sponsors. Click here to view our sponsor privacy policies.

This digital issue is sponsored by:

Research Report: 2015 Strategic Security Survey

by InformationWeekSep 15, 2015

The High Cost of Security Breaches

2014 has been dubbed the “Year of the Data Breach” with millions of records containing personally identifiable information and credit and debit card data siphoned off by cybercriminals. The effect this has on the individuals whose identity, money, or medical records have been taken can be devastating, but what is the impact on the organization whose security defenses failed to keep intruders out?

Fifteen percent of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey suffered a targeted breach or compromise. Fifteen percent of respondents who had a breach or compromise estimated the cost of that breach at between $500,000 and a $1 million, with 6% putting the figure at $5 million or more.

Get all the insight in 2015 Strategic Security Report.

Research Report: How Enterprises Are Attacking the IT Security Challenge

by InformationWeekSep 02, 2015

Enterprise data breaches, new security vulnerabilities, and threats in the mobile and cloud arenas continue to dominate the headlines. Maybe that’s why 46% of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey say that this year they have a bigger information security budget than last year. So how are they going to be investing those extra dollars? Firewalls, email filtering, endpoint protection, and VPNs are again the four most widely deployed security technologies. But 24% of respondents don’t even measure the value of their security investments, so for many enterprises, new investment decisions may be based more on subjective opinion than hard facts.

Information security spending will range from 1% to 10% of this year’s annual IT budget for 51% of our respondents. But for some enterprises, increased spending hasn’t helped much: 15% of our respondents suffered a targeted breach or compromise costing between $500,000 and $1 million, with 6% putting the figure at $5 million or more.

Research Report: Strategy: Monitoring Security in Cloud Environments

by InformationWeekMar 20, 2015

One of the major reasons enterprises have been hesitant to embrace cloud computing technologies is a lack of visibility. Enterprises need ways to track their data as it travels back and forth to the cloud, as well as a way to ensure that their data is safe in a shared infrastructure.

To benefit from cloud computing and minimize risks to your organization’s data, several key components are required: visibility across infrastructures and applications, isolation of critical services, and regularly audited automated processes for threat detection and mitigation. Working closely with cloud providers, administrators can deliver accountability and audit trails for data events in and out of the cloud so enterprises know exactly what is happening with their data. Cloud providers will have their own monitoring tools to track the performance, continuity and security of all of the components that support service delivery, but organizations must invest in their own systems to monitor physical, virtual and cloud environments. Responsibility for security and monitoring of data critical to daily business operations is ultimately your responsibility, not the provider’s.

In this Dark Reading report, we examine tools and practices that enterprises can use to monitor the security of cloud environments and receive notifications when their data might be at risk.

Research Report: Building a Security Analytics Initiative

by InformationWeekJan 28, 2015

Many security teams empathize with Italian artist Sven Sachsalber, who recently spent 48 hours in a Paris museum looking for a needle in a haystack. At least Sachsalber knew what he was seeking, and the haystack didn't keep increasing in size every hour. Those responsible for network security should be so lucky.

In the face of huge and diverse stores of data, many enterprises are turning to big data analytics to help find threats faster and with more accuracy. Threat detection methods based solely on known elements, such as whitelists and blacklists, signature lists, and rule lists, aren't effective against the unknown. However, searching through vast amounts of data can unearth clues that make anomaly detection techniques more effective in spotting malicious activity, while behavioral analytics can better distinguish between legitimate and suspicious users. Gartner predicts that by 2016 more than 25% of global firms will adopt big data analytics for security and fraud detection.

In this report, we discuss tools and methods for harnessing all available security information and for building a forensic analysis process that can lead to faster identification of targeted attacks and to better strategies for enterprise data defense.