Business Technology News and Commentary - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News & Commentary
Content tagged with Security & Risk Strategy posted in August 2016
VMworld: Security, Network, Cloud Are Top IT Concerns
News  |  8/31/2016
At VMworld 2016 in Las Vegas, customers of VMware took to the keynote stage to talk about adapting their data centers through changing times, with virtualization and vCloud Air.
6 Linux Kernel Changes IT Pros Need To Know
News  |  8/30/2016
The 4.7 Linux kernel includes enhancements to security, automated testing prior to release, and an average 7.8 additions per hour over 10 weeks of development. Here is a look at what IT pros need to know about the OS that powers everything from mobile devices to servers and supercomputers.
Hidden IT Security Risk: Privileged User Access
News  |  8/29/2016
A Ponemon report finds the security threats around privileged user access and the resulting insider threat risks appear to be growing. Here's what IT should be keeping an eye on.
11 Ways IT Professionals Can Make Sense of IoT Data
Slideshows  |  8/29/2016
IoT devices are entering the workplace in all shapes and sizes, from workers wearing smartwatches to industrial sensors such as soil monitors. The data pouring in may be so overwhelming it's unclear what should be done with it, why, and what the risks might be. Here are a few ways to navigate the maze.
iOS 9.3.5 Fixes Massive Security Flaw: What IT Needs To Know
Commentary  |  8/27/2016
An active threat using critical iOS zero-day vulnerabilities, which were dubbed "Trident," could allow hackers to install spyware on iPhones. IT managers should ensure employee devices are updated as soon as possible.
US Bank Regulators Tighten Cyber-Security Efforts Around SWIFT
News  |  8/26/2016
Following the theft of millions of dollars from Bangladesh Bank via the international financial messaging system SWIFT, US banking regulators have outlined steps to tighten cyber-security at the nation's banks.
HP EliteBook Gets Sure View To Block 'Visual Hacking'
Commentary  |  8/25/2016
Privacy screens on the HP EliteBook 1040 and HP EliteBook 840 will keep shoulder-surfers from spying on your machine.
France, Germany Push For Encryption Backdoors In Apps
Commentary  |  8/24/2016
The controversial proposal would require app developers to provide access to encrypted messages at the request of law enforcement.
Opera VPN For Android Targets Users, Not Enterprises
News  |  8/23/2016
Opera Software expanded the availability of its mobile VPN to Android devices, giving them the tools they need to circumvent workplace rules governing blocked sites and services.
IT Investment Uptick Triggered By Productivity Goals
News  |  8/23/2016
A recent Deloitte survey indicates businesses are investing more in IT platforms and services that can drive productivity. Specifically, these firms are using IT to increase productivity while they focus on technologies such as cloud and analytics.
8 Steps To Building A Successful Cyber-Security Career
Slideshows  |  8/23/2016
Information security professionals are in high demand, but entering the field can be tricky. Follow these tips to build a successful cyber-security career.
IoT Revolution: IT Leading The Charge
News  |  8/22/2016
While interest in IoT technologies continues to rise among businesses, many organizations are still unsure how it will directly benefit the bottom line. However, the IT department and the CIO are helping to lead the way for those companies that are adopting the technology.
What IT Pros Need To Know About Hiring Cyber-Security Hunt Teams
News  |  8/22/2016
If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.
IoT, Big Data Analytics Driving M&A Market
News  |  8/19/2016
An Ernst and Young report indicates it's full steam ahead in the mergers & acquisitions space in 2016 as companies look to leverage tech to speed their digital transformation. The main drivers behind this trend include big data analytics and IoT, both of which IT professionals should keep an eye on.
How Intelligent Data Analysis Can Transform IT Security: Podcast
Commentary  |  8/18/2016
Welcome to the first episode of InformationWeek's Expert Voice, a new podcast series featuring interviews with top IT executives, managers, and technology experts. In this episode, we speak with Stuart Clarke, chief technical officer for cybersecurity at Nuix, about the impact intelligent data analysis can have on data security.
Tim Cook: Privacy Is Worth Protecting
Commentary  |  8/15/2016
Apple CEO Tim Cook leans on the Founding Fathers to suggest the company did the right thing when asked by the FBI to unlock a terrorist's iPhone. It's an issue that affects IT professionals who need to protect company data, as well as consumers and their personal information.
SaaS Security: Gartner's 5 Tips For IT Pros
News  |  8/15/2016
Cloud services present a major challenge to IT professionals charged with safeguarding their organizations. These 5 steps can help managers bridge the gaps in SaaS security.
IT Pros: Cloud Providers Shouldn't Turn Over Encrypted Data
News  |  8/15/2016
While some IT professionals believe that cloud computing vendors should turn over encrypted data to government agencies, 55% believe that it is not right, according to a new survey from CSA and Bitglass. The report also found that confidence in cloud vendor security is growing.
8 Cyber-Security Certifications To Boost Your IT Career
Slideshows  |  8/14/2016
Cyber-security skills are in high demand across all industries. These certifications can help IT managers boost their security know-how and protect their organizations.
Microsoft Supporting Windows 7, 8.1 On Skylake PCs Until 2020
News  |  8/13/2016
Microsoft has reversed its decision to cut support for Windows 7 and Windows 8.1 in 2018, a move intended to support businesses still transitioning to Windows 10.
Windows Security Update, Beam Acquisition: Microsoft Roundup
News  |  8/13/2016
Microsoft this week released a new build for Office 2016 on Mac, bought live-stream startup Beam, and grabbed the security spotlight following a major leak.
Microsoft Leaks Secure Boot Key, Raises Security Concerns
News  |  8/12/2016
Microsoft has accidentally leaked a key that can enable users to unlock Secure Boot-protected smartphones and tablets running Windows 8.1 or later.
Duke IT Manager Talks Legacy Tech, Security, Career
News  |  8/11/2016
Sasha Calden faces unique security challenges as the IT Manager in one of Duke University's largest academic departments. Here she discusses data management, career development, and the challenge of securing legacy devices.
Google: QuadRooter Threat Blocked On Most Android Devices
News  |  8/10/2016
Google has confirmed that a feature called Verify Apps, built into Google Play Services, is intended to safeguard Android devices from the QuadRooter security threat.
IoT Market Could Top $3 Trillion By 2025, Report Finds
News  |  8/10/2016
IT departments take note: The internet of things market is picking up speed, with new technologies like LPWA paving the way for broader adoption. Even though a new study shows that spending on IoT could reach $3 trillion by 2025, security remains a concern.
Global IT Security Spending Will Top $81 Billion In 2016
News  |  8/9/2016
Gartner predicts worldwide spending on information security products and services will reach $81.6 billion in 2016 -- an increase of 7.9% from last year.
Android Security Flaw 'QuadRooter' Hits 900 Million Devices
News  |  8/8/2016
Researchers have discovered a set of security flaws that could leave more than 900 million Android smartphones and tablets vulnerable to hackers.
7 Cyber-Security Skills In High Demand
Slideshows  |  8/8/2016
Businesses around the world report a shortage in cyber-security talent. Here are the skills IT managers should be seeking to keep their data secure.
'Mayhem' System Wins DARPA's Cyber Grand Challenge
News  |  8/5/2016
An automated system called "Mayhem" took home the top prize in the Cyber Grand Challenge, sponsored by DARPA.
Rio Olympics Has IT Managers Worried About Network Capacity
News  |  8/5/2016
A survey sponsored by Riverbed and conducted by Wakefield Research finds corporate networks will be tested as the 2016 Summer Olympics get underway in Rio.
4 Major Vulnerabilities Discovered In HTTP/2 Protocol
News  |  8/5/2016
Web administrators take note: The vulnerabilities Imperva discovered in the HTTP/2 protocol were reported to vendors, and patched versions are already available.
Ransomware Hit Nearly 50% Of Businesses In 2015: Study
News  |  8/3/2016
Last year nearly half of businesses were attacked with ransomware, which caused 34% of enterprises to lose revenue and 20% to cease operations immediately.
Samsung's Galaxy Note 7: Smartphone Security Stepped Up
Commentary  |  8/3/2016
The iris scanner and fingerprint reader bring a new level of security to Samsung's latest device, making it more attractive to business customers.
Google's Cloud Lets You Bring Your Own Encryption Keys
News  |  8/3/2016
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
Data Theft Prevention: Companies Lack Policies, Knowledge
News  |  8/3/2016
Data theft is rampant, and companies don't seem to know what to do to stop it, according to a recent study. This infographic breaks it down for IT professionals.
IoT Investments Rise, But IT Pros Harbor Security Concerns
News  |  8/2/2016
As IoT investment grows, with billions of dollars flowing into new enterprises, IT departments, as well as other parts of the business, are expressing concerns over the security risks the technology poses.
Cyber-Security Skills Shortage Leaves Companies Vulnerable
News  |  8/1/2016
A lack of valued cyber-security skills has left businesses open to attacks resulting in reputation damage and data loss, research shows.
Windows 10 Provides Little Incentive For IT To Upgrade
News  |  8/1/2016
An Adaptiva survey finds businesses of all sizes are slowly migrating to Windows 10, but the update isn't adding any particular degree of urgency. The survey also found that while many IT professionals like some of the features, moving to the OS isn't a priority.


State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll