Business Technology News and Commentary - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News & Commentary
Content tagged with Security & Risk Strategy posted in March 2016
FBI's Ability To Crack iPhones Raises More Questions
News  |  3/31/2016
The FBI, with its newfound hack, has agreed to unlock other iPhones. While the dispute with Apple is off the front burner for now, the company is still facing other legal challenges, including one case in Brooklyn. Serious legal and technical questions linger.
Apple Vs. The FBI: Protecting The Poetry Of Code
Commentary  |  3/31/2016
If the FBI had succeeded in its attempt to have Apple write a new version of iOS (FBiOS, perhaps?), then what would a tech vendor have been required to do next?
Mobile Messaging Apps: 8 Tips For Keeping Your Workplace Secure
Slideshows  |  3/31/2016
The old struggles over BYOD have been replaced with application struggles, as employees use favorite mobile messaging apps for enterprise purposes. As with BYOD, pushing back isn't the answer. Innovating forward is.
IM Surges In Enterprise, But Ushers In Security Concerns
Commentary  |  3/30/2016
Over the past 20 years, email has been the preferred communication technology in the enterprise. Now, as workers go mobile, instant messaging is replacing email, and that's a big security concern for IT.
How The Network Time Foundation Uses Its Funding
News  |  3/29/2016
The Network Time Foundation saw a big jump in funding in 2015. While it's a step in the right direction, there's still much work ahead to shore up the open source Network Time Protocol (NTP) that synchronizes computer clocks around the world. Here's where the money is going, and what's still needed.
Harlan Stenn Tackles NTP Security Issues As Big Move Looms
News  |  3/28/2016
There's not a business in existence today whose operations don't rely on the Network Time Protocol (NTP). Harlan Stenn is the chief maintainer of NTP. In the past year, security researchers have raised a number of concerns about the protocol, which Stenn is addressing even as he prepares a move of half the NTP infrastructure. Here's why it matters.
White House Petition Aims To Stop The JavaScript Scourge
Commentary  |  3/27/2016
Is it time to put an end to JavaScript once and for all? Someone thinks so, and they've got the White House petition to prove it.
Verizon Enterprise Data Hit, Hackers Seek Big Payday
News  |  3/25/2016
Verizon Enterprise Solutions is the latest company to fall victim to a data breach where cyber-criminals are targeting potentially lucrative corporate information, rather than details about consumers.
iPhone Cracking: Why FBI Needed Outside Help And What It Means
Commentary  |  3/24/2016
This week, the FBI said it now doesn't need Apple to crack into an iPhone. However, what does this tell us about encryption and the overall state of hardware security?
US Federal Agencies Hit With 10% Jump In Cyber 'Incidents'
News  |  3/22/2016
US government agencies faced a double-digit rise in cyber-security incidents last year, even though the White House greatly ramped up efforts to button down cyber-security, according to an Office of Management and Budget report.
CoreOS Offers Automated Security Checks As A Service
News  |  3/22/2016
Clair 1.0 is ready for production use to make containers more secure. Also, new threats will be added to its vulnerabilities database.
FBI Aims To Crack iPhone Without Apple, Cancels Court Date
News  |  3/22/2016
The FBI may have just found a way to access an encrypted iPhone, it said in a March 21 legal filing to cancel its court date with Apple, stating that the agency will report back April 5.
Apple, FBI Head Into Court March 22
News  |  3/21/2016
The FBI's Feb. 16 court order citing the All Writs Act and demanding Apple's cooperation in unlocking an iPhone will go before a judge March 22, after more than a month of global attention and a day after a press event at Apple Headquarters.
Barry University CIO: Managing The Mobile Security Load
Commentary  |  3/21/2016
In higher ed, CIOs have to deal with ultra-connected students and faculty whose devices increase the security burden on IT, while managing the growing use of online video as an educational tool. Here's how the CIO of Barry University in Florida handles it all.
Apple Engineers Could Quit Over iPhone Encryption Case
News  |  3/18/2016
Several Apple engineers have told the New York Times that they'd consider leaving one of the industry's most prized companies and positions rather than be made to create a so-called GovtOS to crack the iPhone's encryption technology.
Supreme Court Nominee Could Tip Scales In iPhone Encryption Case
Commentary  |  3/18/2016
How might Obama's Supreme Court candidate approach the case between Apple and the Justice Department? Merrick Garland has said the role of the court is not to legislate but to "apply the law to the facts of the case."
IoT Security Could Crack Quickly In The Quantum Era
Commentary  |  3/18/2016
Internet of Things security is only beginning to get serious attention. However, it might already be too late. In the era of quantum computing, the fragile security that protects IoT devices may crumble faster than you think.
10 Cloud Startups Worth Your Attention
Slideshows  |  3/17/2016
If your view of the cloud marketplace is dominated by the Amazons and Googles of the world, you may be missing out on solutions that better target your needs. Here's our list of 10 up-and-coming cloud providers worth a look.
Google Traffic Is 77% Encrypted
News  |  3/16/2016
Google, however, notes improvement is still needed on its own products and services. Gmail encryption support is 100%, but these other products and services fall short.
Apple Legal Filing: 'The Founders Would Be Appalled'
News  |  3/16/2016
Apple filed another legal brief March 15 in its fight with the FBI and DOJ. The iPhone maker is fighting efforts to give up its source code, and several tech and security experts agree, calling the government's request "potentially cataclysmic."
Mobile, Cloud Security Are Top IT Leadership Concerns
News  |  3/16/2016
Greater awareness of data security among business leaders isn't yet matched by budgetary respect or business commitment, according to recent study findings.
IDC: Cyber Insurance Will Be Commonplace In The Future
News  |  3/15/2016
IDC is advising insurers faced with a mature market to consider offering cyber insurance. Cybercrimes, it says, have cost the global economy $445 billion.
iPhone Encryption Battle: What Apple Can Learn From BlackBerry
Commentary  |  3/15/2016
BlackBerry was the preferred smartphone for business users a mere five years ago, until the company decided to allow certain governments to access user messages. Apple could face the same confidence loss from corporate customers if the company assists the FBI to crack the security of the iPhone.
9 Hot Big Data And Analytics Startups To Watch
Slideshows  |  3/14/2016
Hadoop recently celebrated its 10th birthday, advanced analytics have become even more sophisticated, and a plethora of startups have arisen to help organizations wrangle all the data and pull out insights. With all that in mind, here are nine big data and analytics startups to watch.
HPE's Machine Learning APIs, MIT's Sports Analytics Trends: Big Data Roundup
News  |  3/13/2016
We've got news from HP Enterprise, MapR, and IBM Watson in our Big Data Roundup for the week ending March 13. Plus, we bring you a summary of top trends in analytics for sports, and tell you why you may be headed to the most forgettable city in the country.
iPhone Encryption Battle: Feds Launch Latest Salvo
News  |  3/12/2016
The government's impatience is evident in its third filing asking for Apple's cooperation in unlocking the iPhone used by one of the San Bernardino terrorists. The document is a point-by-point rebuttal that reads like the government taking a final, very deep breath before it completely loses its temper.
US Anti-Encryption Legislation Is Imminent: Report
News  |  3/10/2016
US Senators Feinstein and Burr are preparing legislation that would punish tech companies that refuse to cooperate with investigators, Reuters reports. French lawmakers recently backed a similar mandate that goes one step further by threatening jail time for execs who don't cooperate with law enforcement.
FBI Changes How It Uses NSA Data: Report
News  |  3/9/2016
With calls for greater transparency in the rules governing Section 702 of the NSA's Prism program, the FBI has made classified changes, The Guardian confirmed. The program has implications for businesses and individuals alike.
9 Books Every IT Leader Needs To Read
Slideshows  |  3/9/2016
Reading sharpens our reasoning, reduces stress, advances our careers and, when done deeply and broadly, is a key habit of successful leaders.
Feds Appeal Apple's iPhone Encryption Win In NY Case
News  |  3/8/2016
Apple may have hoped to "hang its hat" on a recent iPhone encryption win in a Brooklyn court, but the Justice Department has requested revisiting the judge's ruling.
Apple's Federighi: Encryption Reversal Would Put US At Risk
Commentary  |  3/7/2016
With the Feds pressing Apple to return to iOS 7-style security, Craig Federighi, Apple's head of software engineering, used an op-ed piece in The Washington Post to explain the need to always race forward.
How Stryker's First-Ever CISO Reined In Cloud Chaos
Commentary  |  3/7/2016
From her post as deputy CIO of The White House to being named the first-ever CISO at Stryker, a medical device manufacturer, Alissa Johnson is no stranger to challenges. Here's a look at how she reined in an environment loaded with cloud applications and shadow IT.
IoT Security: Industry Finally Waking Up To The Dangers
Commentary  |  3/3/2016
For the last several years, Internet of Things security has been one of the most hotly debated topics at Mobile World Congress. This year, however, IoT security took on a new sense of urgency as more devices are being connected and the technology turns mainstream.
IBM Builds Out Security Response With Resilient Systems Acquisition
News  |  3/2/2016
IBM has joined the cyber-security acquisition frenzy with its own buy of Resilient Systems. Big Blue gains the company's incident response platform and its well-known CTO Bruce Schneier.
Google Nudges Customers Toward Two-Factor Authentication
News  |  3/2/2016
As our Google home and work lives blur, Google is working to increase security on the business, as well as the personal side.
Healthcare.gov: Hard-Earned Lessons For CIOs
News  |  3/2/2016
It's been just over two years since the controversial and troubled launch of Healthcare.gov, a marquee project for a new age of digital government, implementing a politically controversial policy of affordable healthcare insurance for everyone. As of today more than 6 million people have been enrolled through this system. InformationWeek caught up with Healthcare.gov's technology lead to talk about lessons learned.
Siri, Cortana Are Listening: How 5 Digital Assistants Use Your Data
Slideshows  |  3/2/2016
Learn more about how digital assistants including Amazon Alexa, Facebook M, Google Now, and Apple's Siri are rewriting the rules around data privacy and sharing.
Microsoft's Top Lawyer Voices Support For Encryption At RSA
News  |  3/1/2016
Brad Smith, Microsoft's president and chief legal officer, emphasized the importance of maintaining consumer privacy during his keynote at RSA 2016. He also emphasized his company's support for Apple against the FBI.
HPE Fortifies Security For Mobile And Enterprise
News  |  3/1/2016
HPE Security is looking to improve the security of mobile devices and the enterprise overall with two new security offerings announced in conjunction with the RSA Conference. HPE also released its Cyber Risk Report 2016.


State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll