Business Technology News and Commentary - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News & Commentary
Content tagged with Security & Risk Strategy posted in May 2016
Microsoft's Revamped Ventures Division Will Focus On Startups
News  |  5/31/2016
Microsoft has repositioned Microsoft Ventures, its internal startup accelerator, to focus on investments in early-stage businesses.
Equinix Service Aims To Scrub Out DDoS Attacks
News  |  5/31/2016
Equinix is making F5 Networks' Silverline protection available in a handful of its International Business Exchange data centers. Silverline can detect the launch of an attack as it makes use of the network and take steps to mitigate it in real-time.
Panama Papers Fallout: What If Your Lawyer Gets Hacked?
Commentary  |  5/31/2016
As the latest wave of high-profile breaches shows, all the sensitive information law firms handle makes them attractive cyberattack targets. Here's what can happen and what you should do about it.
Google May Shame Partners Into Ending Android Fragmentation
Commentary  |  5/26/2016
Google might resort to naming and shaming smartphone makers and carriers who are behind in updating Android devices.
FedRAMP Is Too Complicated, Not Secure Enough: Survey
News  |  5/26/2016
The FedRAMP standard for federal agency use of cloud services has too many complications in its operations and lacks the assurance of security, according to the results of a MeriTalk survey.
How TD Bank Is Transforming Its Data Infrastructure
News  |  5/25/2016
TD Bank has embarked on an effort to transform traditional banking data infrastructure into a more modern system built on a new application framework and APIs. This system leverages TD Bank's data to deliver insights on-demand.
Microsoft Unveils Plan To Combat 'Terrorist Content'
News  |  5/23/2016
Microsoft has unveiled a two-pronged approach to fighting back against terrorists' efforts to use the Internet and social media to communicate with one another and recruit new members.
6 Barriers To IoT Data Flow
Slideshows  |  5/23/2016
Enterprises are integrating IoT devices into their ecosystems to get data that was not available previously. As with most new data sources, there may be concerns about whether the data is accessible, usable, valuable, and secure. Here are a few things to consider as your enterprise moves toward IoT.
Apple May Add Touch ID To OS X
News  |  5/20/2016
The iconic computer and device maker is reportedly considering an OS X 10.12 feature that would allow users to unlock their Macs via the same Touch ID technology that's in iPhones and iPads.
LinkedIn Hack: Why Breach Is A Wake-Up Call For Users
News  |  5/19/2016
The 2012 LinkedIn security breach is far worse than previously reported. Now reports say that hackers are trying to sell information for more than 117 million accounts, which should have people who use the same password on multiple sites worried.
ServiceNow Adds Azure To Its Cloud Management Front End
News  |  5/18/2016
ServiceNow previously automated services for internal customers using AWS and VMware; now it's added the Microsoft Azure cloud.
Microsoft SQL Server 2016 Update Embraces Hybrid Cloud, Big Data
News  |  5/17/2016
Microsoft's forthcoming SQL Server 2016 adds better encryption, support for unstructured data queries including those on Apache Hadoop, and new features to enable the hybrid cloud. The updates are part of an overhaul that updates Microsoft's flagship database management platform for a new age.
Google Ending Automatic Chrome Support For Flash
News  |  5/16/2016
Google's Chrome browser will begin to display HTML5 video and animation, when they're available, on all but 10 websites starting in the fourth quarter of this year. It's another serious blow to the Adobe Flash platform.
FBI Chief: Battle Over Encrypted Devices Rages On
News  |  5/12/2016
Despite dropping its fight with Apple over creating a backdoor to access the iPhone used by one of the San Bernardino shooters, the FBI still plans to pursue access to other encrypted devices and data, said the agency's director.
Microsoft Kills Controversial Windows 10 Wi-Fi Sense
News  |  5/11/2016
In its latest Windows 10 build, Microsoft disables its Wi-Fi Sense feature, which allows users to easily share their networks with friends -- and, inadvertently, hackers.
Docker Security Scanning Protects Container Software Stack
News  |  5/11/2016
Docker addresses vulnerabilities that can creep into the container's software stack with its just released Security Scanning offering.
IBM Watson To Fight Cybercrime
News  |  5/10/2016
After Watson beat human players on the TV game show Jeopardy!, its cognitive might was put to work in a variety of fields, including healthcare and finance. Now IBM Security is dispatching the supercomputer to fight cybercrime.
FCC, FTC Probe Carriers' Mobile Security Patch Protocols
News  |  5/10/2016
The FCC and the FTC want to know how mobile carriers, such as Verizon Wireless, T-Mobile, and AT&T, are responding to mobile threats and protecting consumers with security patches.
Twitter Blocks US Spy Agencies' Access To Dataminr
News  |  5/9/2016
Silicon Valley's fight to protect users' privacy against inquiries by intelligence agencies could escalate with Twitter denying access to a data mining service that reveals political unrest and terrorist attacks in real-time.
Opera VPN For iOS: Access Blocked Sites With iPhones, iPads
Commentary  |  5/9/2016
Opera Software just handed people the key to unlock Facebook, YouTube, and other sites their organizations' networks may be blocking.
Data Products: 9 Best Practices To Minimize Risk
Slideshows  |  5/9/2016
Data generation, collection, and analysis are making their way into more types of products and services. The trend is creating new opportunities for innovation, some of which are so impactful, they're causing some companies to revisit their business models. The path to success isn't always obvious, however, so here are a few best practices to keep in mind.
7 Ways Cloud Computing Propels IT Security
Slideshows  |  5/8/2016
A spate of high-profile public and private cloud security breaches is helping to push advancements in security such as encryption. Here's a look at 7 ways the cloud may be the largest driver of IT security today.
Intermountain Healthcare Balances IoT Adoption And Security Vigilance
News  |  5/6/2016
Intermountain, a Salt Lake City healthcare provider, innovates with Internet-connected patient devices, but clamps down on security exposures when it sees them.
Technicolor's Cloud Transition Enables Hollywood-As-A-Service
News  |  5/4/2016
Technicolor provides services to content creators and distributors in Hollywood, but the company faced challenges scaling to storage requirements that were projected to grow 100 times over. Here's how the company's new CIO transitioned the organization to embrace elastic cloud-focused services.
Verizon Outages Hit Thousands Amid Strike
News  |  5/4/2016
Thousands of businesses and consumers have lost wireline services over the past several weeks, as Verizon Communications contends with a spike in cases of vandalism and striking workers.
Capital One: Think Like A Designer, Work Like A Startup
News  |  5/2/2016
The creation of Capital One Wallet is an example of how a large financial services IT organization can move like a startup and think like a design firm, transforming business expectations in the process. Their work earned them the No. 1 spot in the 2016 InformationWeek Elite 100.
Horizon Prioritizes Data And Patient Experience
News  |  5/2/2016
Horizon Blue Cross Blue Shield of New Jersey implemented a fee-for-value healthcare delivery model that uses new technologies to gather data and improve member experience. More than 80 business processes were created or modified, transforming systems for enrollment, claims processing, billing, customer service, provider portals, sales, and benefit monitoring. These efforts earned the company the No. 3 spot in the 2016 InformationWeek Elite 100.
The Elite 100: Celebrating The People Who Make IT Happen
Commentary  |  5/2/2016
To talk about technology transforming business only tells part of the story, though. At the end of the day, it's the people behind the technology who are the true agents of change. Join us as we celebrate their work in the 2016 InformationWeek Elite 100.


State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Commentary
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
Register for InformationWeek Newsletters
Video
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll