Business Technology News and Commentary - InformationWeek
IoT
IoT
News & Commentary
Latest Content tagged with Security & Risk Strategy
Page 1 / 2   >   >>
Share the Cost of Secure Application Development
Commentary  |  11/22/2017
The cost of protecting applications from cyberattacks is climbing fast. So, it's time for business units to help cover the pricetag.
Openness – The Key to Rapid Change in the Digital Era
Commentary  |  11/21/2017
Change is never easy, particularly in an age of constant change. So, consider new ways to implement change and smooth the process.
Make Cybersecurity About Innovation and Growth
Commentary  |  11/16/2017
Cybersecurity doesn't have to be just a cost of doing business. With the right approach, it can both protect while creating new levels of business growth.
Tech Vendors to Watch in 2018
Commentary  |  11/14/2017
Browse through the hottest vendors in cloud, DevOps, infrastructure, security, and data and analytics.
Are DevOps and Software Quality Incompatible?
Commentary  |  11/9/2017
The DevOps concept's focus on speed to market and continuous release can leave gaps in software quality. Understand which ones you can live with, and which are critical.
How to Hire Diverse Talent in Security
How to Hire Diverse Talent in Security
InformationWeek Videos  |  11/8/2017
Juliet Okafor, VP of business development at Fortress Information Security, shared why she thinks the security talent shortage is a myth.
The Cloud: We're Not in 2012 Any More
News  |  11/6/2017
Forrester's upcoming cloud 2018 predictions report, scheduled for release tomorrow, highlights just how dramatic developments in security, analytics, and applications tools have advanced the cloud.
Embrace the Cyber Security-Physical Security Nexus
Commentary  |  11/6/2017
It's time for the IT security team and the physical security team to work together on a "cyber-physical" security strategy.
Securing Travel and Trade with Blockchain
Commentary  |  10/27/2017
Among the growing number of potential applications for blockchain is border management and security.
Quantum Computing Brings Promise and Threats
News  |  10/26/2017
Faster, better, potentially dangerous. Quantum computers will push way past the boundaries of traditional computers, but to what ends? We explore some of the possibilities.
Amazon Key: Just a Few Key Concerns
Commentary  |  10/26/2017
The introduction of Amazon Key as an in-home delivery service stretches trust just a bit too far.
Staying Relevant and Successful in the Best and Worst Climates
Commentary  |  10/25/2017
A look back at a quarter century's worth of experiences that companies of all sizes can learn from
Management Tools Bring Structure to Multi-Cloud Environments
News  |  10/19/2017
New tools help enterprises organize and maximize their expanding multiple cloud infrastructure.
15 Highest-Paying Tech Jobs for 2018
Slideshows  |  10/17/2017
Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.
10 Steps Enterprises Need to Take to Comply with GDPR
Slideshows  |  10/11/2017
If your organization doesn't have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.
AIM Was a Pioneer in Collaboration
News  |  10/10/2017
Now 20 years old, AOL Instant Messenger is quietly heading to software's trash heap.
How to Maintain Security when Rolling out DevOps
Commentary  |  10/5/2017
DevOps may be up and running for your enterprise. Taking the time to integrate security will keep it that way.
Cyberthreats: Stay Ahead of Them with a Proactive Strategy
Commentary  |  10/4/2017
To mitigate the risks presented by more aggressive cyberthreats, organizations need to get out in front of those threats.
One More Reason to Care about the Equifax Data Breach
Commentary  |  10/4/2017
The Equifax data breach should open our eyes to the issue of explicit consent, a concept our peers in Europe are dealing with now.
Moving the Cloud Closer to the Business
Commentary  |  10/2/2017
We will soon reach the point where connectivity to cloud resources is going to become a serious issue in terms of real-time computing functions. So, how do we bring the cloud closer to us?
Cybersecurity Should Be Chess, Not Checkers
Commentary  |  9/29/2017
Cybersecurity initiatives for government agencies -- in fact, other organizations, too -- have to be proactive and iterative.
It's a New, Challenging World for Data Governance
Commentary  |  9/26/2017
Data governance strategy is rapidly shifting from the defense to the offense.
World Vision Takes on Security for the Good of Children
World Vision Takes on Security for the Good of Children
InformationWeek Videos  |  9/26/2017
Ed Anderson, Global CIO, World Vision International sat down with Dark Reading editor, Sara Peters, at the InformationWeek News Desk at Interop ITX to talk about their award-winning security strategy.
The Cyber Risk of False Confidence
News  |  9/25/2017
Companies are overly confident about their cybersecurity, and it's leaving their data (and maybe yours too), open to some major security risks.
An IT Pro Takes the Dive into Deep Learning
Commentary  |  9/21/2017
IT professional Rich Casselberry experimented with deep learning using online tools and came away with interesting results.
Cybersecurity Becomes a Career Choice
News  |  9/21/2017
Young people can't ignore the news. Data breaches are everywhere and they're beginning to realize that it's up to them to keep our personal and national information private.
One Point the Equifax Breach Drives Home
News  |  9/18/2017
Equifax blamed its recent high-profile breach on the Apache Struts Web Framework. As software delivery cycles shrink, developers have to rely on more third-party components, libraries and frameworks. When they do, what are their liabilities and responsibilities?
3 Tips for Making Better Investments in Security
Commentary  |  9/15/2017
Information security's role is becoming more strategic, but its approach to making investment decisions hasn't kept pace. To better align security investments with enterprise strategy, IT and security leaders must stay focused on the right risks, add rigor to decision making processes, and give stakeholders opportunities for input.
Cloud Computing Spurs Hybrid Architecture Adoption
News  |  9/14/2017
Enterprises turn to the hybrid cloud for disaster recovery, data archiving and other applications.
3 Ways Blockchain is Changing Cybersecurity
Commentary  |  9/14/2017
The tech sector is looking at new uses for blockchain, and information security is one area that holds promise.
12 DevOps Terms You Need to Know
Slideshows  |  9/13/2017
Before taking that big step into DevOps, here are 12 core DevOps terms you'll want to understand.
Alexa for the Enterprise? Not Yet, but It’s Coming
Commentary  |  9/12/2017
Now that you might be accustomed to using Siri, Alexa, Cortana or Google Assistant in your personal life, consider the potential for voice technology in the enterprise.
Set the Right Foundation for Applications with Improved CX
Commentary  |  9/11/2017
IT teams can salvage the value of legacy systems while pivoting to a new foundation offering better customer experiences.
Hurricanes: Risk Analytics in a World of Uncertainty
News  |  9/7/2017
The already-devastating hurricane season highlights the need for predictive analytical models that account for exceptional events.
How Smart Is Artificial Intelligence Really?
Commentary  |  9/6/2017
SAS CTO Oliver Schabenberger counters Tesla founder Elon Musk's description of artificial intelligence as the scariest problem.
In the Aftermath of a Cyberattack
Commentary  |  8/30/2017
As hackers continue ramping up their attacks everyone involved in IoT -- manufacturers, integrators, and customers -- has to improve their defenses.
What IT Spending Forecasts Tell Us About the Future of IT
News  |  8/25/2017
IT spending patterns make it clear that we are in a software and cloud-based world.
Fannie Mae Tackles DevSecOps
Fannie Mae Tackles DevSecOps
InformationWeek Videos  |  8/24/2017
Fannie Mae's focus on the customer led them to a DevSecOps strategy that won 1st place in the InformationWeek IT Excellence DevOps category.
10 Best US Cities for Tech Jobs in 2017
Slideshows  |  8/22/2017
These metro areas have seen the biggest gains in software jobs over the last five years. You might be surprised by where some cities rank, and which noted tech employer missed the cut.
Integrating Security into DevOps Takes Care
Commentary  |  8/18/2017
It makes sense to involve IT security with DevOps, but the integration isn't as easy as it sounds.
Does Your Breach Incident Response Plan Have Holes?
Commentary  |  8/16/2017
The likelihood of a company suffering a breach is worse than most believe. Here's a checklist for building out a plan to deal with a breach.
Innovation Relies on Humanizing the IT Organization
Commentary  |  8/11/2017
IT organizations are quick to talk about hardware failures, software failures, and outages, but so often the cause of IT failures can be pinned on people.
Financial Institutions Bank on Change to Stay Competitive
News  |  8/4/2017
Corporate transformation seen as the best way to counter digital disruption and address other key challenges.
Peer Advice: 7 Steps Toward Change
News  |  8/4/2017
Tips for financial institutions or others heading for digital transformation.
Think AI, Clouds, Football, and Structure
Commentary  |  8/3/2017
One of the challenges to innovation and adoption of emerging technologies is our reliance on classifying everything and everyone.
Why Businesses Need to Update Their DR Plan Now
Commentary  |  8/1/2017
With cyberattacks becoming more common, and natural and man-made disasters not going away, disaster recovery programs are more important than ever.
MillerCoors’ $100-Million IT Lawsuit Warning
News  |  7/27/2017
There are lessons to be learned by CIOs planning outsourcing projects in the dueling lawsuits involving MillerCoors and HCL.
What Analytics Pros Need to Know about GDPR
Commentary  |  7/26/2017
Understanding the EU's GDPR guidelines is valuable knowledge for anyone in a data related profession.
Data Drift Happens: 7 Pesky Problems with People Data
Commentary  |  7/19/2017
Making sense of data associated with customers, citizens and other individuals may seem simple, but it's possible that the records don't tell the real story.
Dark Reading INsecurity Conference Registration Now Open
Commentary  |  7/19/2017
November event will focus on attendee interaction, "blue team" best practices.
Page 1 / 2   >   >>


2017 State of IT Report
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll