Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.By Kelly Sheridan Staff Editor, Dark Reading, 8/21/20180 comments | Read | Post a Comment
Cybersecurity is more painful to manage as technology architectures become more complex. Simplify your approach by avoiding these major security mistakes.By Lisa Morgan Freelance Writer, 8/21/20180 comments | Read | Post a Comment
There's much more to implementing Robotic Process Automation than plugging in a software package. It's about the business as much as technology.By Jim Shand, Director, AlixPartners , 8/21/20180 comments | Read | Post a Comment
Heather Doshay explains how a simple project helped build empathy and equalize engagement between remote employees and onsite staff.By Susan Fogarty Editor in Chief, 8/16/20180 comments | Read | Post a Comment
For many organizations, knowledge management is a forgotten technology. Now, new attitudes and approaches may help KM systems live up to their original potential.By John Edwards Technology Journalist & Author, 8/16/20180 comments | Read | Post a Comment
Value-based healthcare is changing the business model for doctors and hospitals. Here's how analytics is helping these practices change the way they work.By Jessica Davis Senior Editor, Enterprise Apps, 8/16/20180 comments | Read | Post a Comment
Develop a multi-cloud strategy that can genuinely benefit your organization by following these recommendations.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 8/16/20180 comments | Read | Post a Comment
Car hacking specialists shift gears and work on car defense in their latest gigs - at GM subsidiary Cruise Automation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/15/20181 Comment | Read | Post a Comment
Organizations feel pressured to appoint chief analytics officers and chief data officers, but they may not be using those roles as effectively as they could.By Lisa Morgan Freelance Writer, 8/15/20180 comments | Read | Post a Comment
Formalized customer engagement programs are ideal for gathering input to product development, validating corporate strategies and deepening relationships with key customers.By Rob Jensen, VP of Marketing, Ignite Advisory Group , 8/15/20180 comments | Read | Post a Comment
Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/14/20185 comments | Read | Post a Comment
IT leaders must invest in future-focused technology to drive business success, but do it all with an eye on the budget.By Jessica Davis Senior Editor, Enterprise Apps, 8/14/20180 comments | Read | Post a Comment
Your future shopping experiences might be much more automated, but they also might be much more personal than todayís trips to the store.By Cynthia Harvey Contributor, NetworkComputing, 8/14/20180 comments | Read | Post a Comment
Nearly 17% of 10,644 vulnerabilities disclosed so far this year have been critical, according to new report from Risk Based Security.By Jai Vijayan Freelance writer, 8/13/20181 Comment | Read | Post a Comment
The Next Generation of IT SupportThe workforce is changing as businesses become global and technology erodes geographical and physical barriers.IT organizations are critical to enabling this transition and can utilize next-generation tools and strategies to provide world-class support regardless of location, platform or device
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.