Business Technology News and Commentary - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News & Commentary
Content tagged with IT Strategy posted in February 2008
Don't Discount The Threat Of Web 2.0 Terror
Commentary  |  2/28/2008
We've recently seen silly articles hyping the threat of terrorists using virtual worlds and other Web 2.0 sites for recruitment, planning, and training. And we've seen equally silly articles ridiculing the idea. The truth is that Web 2.0 tools are great for terrorism, for the same reasons they're great for legitimate projects. That doesn't mean we should shut down Facebook and Second Life to protect ourselves from instant, horrible death. But we do need to rationally evaluate possible threats.
If We're Headed Into A Recession, What Will Happen To IT?
Commentary  |  2/26/2008
IT budgets and tech staffs were clobbered during the recession of the early 2000s. But how would they survive this time around? Hasn't most of the "fat" already been slashed, or has much of it returned?
India Outsourcing Industry Chief Faces Criminal Prosecution
Commentary  |  2/21/2008
Nasscom, which just wrapped up an annual conference that drew thousands of people worldwide to Mumbai, has been hit with a nasty blow. Its president faces prosecution for allegedly failing to ensure the safety of a Hewlett-Packard nighttime call-center employee prior to her murder.
Symantec Offers SMB Storage And Backup Services
Commentary  |  2/19/2008
As today's bMighty ANTenna points out, security giant Symantec is making a move into small and midsize business services. Its first salvos: hosted backup and online storage.
Study Finds Outsourcing Delivers ROI, But Not Innovation
News  |  2/15/2008
Those dissatisfied with outsourcing deals cited high costs, poor communications, and underestimating the project's scope.
Open-Source Security: Trust, But Verify
Commentary  |  2/13/2008
Is open-source software more secure than proprietary software? There may be just one company on the planet that can answer that question, and they aren't talking. What they can tell us, however, may be just as interesting -- and perhaps even more disturbing.
SecureWorks: Attacks Against Healthcare Up 85%
News  |  2/13/2008
Personal, identifiable information, health insurance credentials, and financial data targeted by hackers
Baby Boomer 'Brain Drain' Will Be A Slow Leak
Commentary  |  2/11/2008
Even before the first wave of baby boomers began reaching retirement age, predictions of an impending brain drain looked pretty dire. About 50% of the federal government's workforce was expected to retire over the next few years. Now, it looks like many of those people will be staying put longer.
IC3: Valentine's Day Card is Storm
News  |  2/11/2008
With Valentine's Day approaching, IC3 warns about spam emails spreading the Storm Worm malicious software
Securites Industry Next Target of Online Fraud
News  |  2/11/2008
Securities and brokerage survey shows firms take page from banks in fight against online fraud and identity theft
IT And Legal: Best Friends Forever
Commentary  |  2/7/2008
If your IT department isn't pals with legal, now's the time to strike up a friendship. Both departments must work together to produce e-mail and files related to litigation, otherwise known as e-discovery.
Study: EU Should Serve as 'Clearing House'
News  |  2/6/2008
How to best alert European SMEs and citizens of cyber attacks?
WVU Partners With FBI on Biometrics
News  |  2/6/2008
West Virginia University named national leader for FBI biometrics research
IBM To Open Two More Offshore Development Centers In India
News  |  2/5/2008
Yet IBM isn't immune from a talent war that has raised questions about skill levels of employed engineers in India.
Google Bolsters E-mail Security
Commentary  |  2/5/2008
InformationWeek
Memento Adds ACH Security
News  |  2/5/2008
Memento helps protect banks from emerging ACH fraud threats
Codenomicon Names Schmidt & Klein to Board
News  |  2/5/2008
R&H's Howard A. Schmidt and Wind River's Ken Klein strengthen board's security software knowledge
Webroot Launches Parental Controls Product
News  |  2/4/2008
Partnership with Boys & Girls Clubs of America helps to protect thousands of children online


The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Commentary
Gartner Forecast Sees 7.3% Shrinkage in IT Spending for 2020
Joao-Pierre S. Ruth, Senior Writer,  7/15/2020
Slideshows
10 Ways AI Is Transforming Enterprise Software
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/13/2020
Commentary
IT Career Paths You May Not Have Considered
Lisa Morgan, Freelance Writer,  6/30/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll