Password-sharing and reuse is still prominent, but multifactor authentication is on the rise, new study shows.By Dark Reading Staff , 10/1/20180 comments | Read | Post a Comment
No matter what industry you're in, artificial intelligence is likely to affect your job. Here's how.By Cynthia Harvey Contributor, NetworkComputing, 10/1/20180 comments | Read | Post a Comment
The growing importance and complexity of IT mean that the CIO needs a seat at the table when it comes to driving innovation.By David Politis, CEO of BetterCloud , 10/1/20180 comments | Read | Post a Comment
A vulnerability in Facebook's "View As" feature let attackers steal security tokens linked to 50 million accounts, the company confirms.By Kelly Sheridan Staff Editor, Dark Reading, 9/28/20181 Comment | Read | Post a Comment
In a post-GDPR world, IT and business leaders face unprecedented pressure to demonstrate they are responsible data stewards. Here are six steps that might help.By Karen Schuler and Taryn Crane, BDO LLP , 9/28/20180 comments | Read | Post a Comment
Everybody talks about blockchain, but is anybody really doing it? Here's a look at five use cases across industries. By Jessica Davis Senior Editor, Enterprise Apps, 9/28/20180 comments | Read | Post a Comment
A collection of information resources designed to help enterprise IT professionals launch and advance their artificial intelligence, machine learning and automation initiatives.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 9/27/20180 comments | Read | Post a Comment
The decision comes days after security researcher had blasted company for jeopardizing user privacy with browser update.By Jai Vijayan Freelance writer, 9/27/20182 comments | Read | Post a Comment
Imagine rebuilding an airplane in flight. That's how you can modernize your enterprise technology.By Shannon Weyrick, vice president of architecture, NS1 , 9/27/20180 comments | Read | Post a Comment
All versions of Red Hat Enterprise Linux, CentOS vulnerable to 'Mutagen Astronomy' flaw, according to Qualys.By Jai Vijayan Freelance writer, 9/26/20180 comments | Read | Post a Comment
Microsoft engineer details how the company's IoT security solution operates - at multiple layers starting with the microcontroller.By Curtis Franklin Jr. Senior Editor at Dark Reading, 9/26/20181 Comment | Read | Post a Comment
USB thumb drives may be used less frequently than before, but they are still commonly used as infection vectors for a wide variety of malware.By Curtis Franklin Jr. Senior Editor at Dark Reading, 9/26/20188 comments | Read | Post a Comment
Here are some proven techniques you can use to keep your most valuable team members on board and energized.By John Edwards Technology Journalist & Author, 9/26/20180 comments | Read | Post a Comment
Predictive analytics, offering a data-enabled view into what is likely to happen, are key to driving organizational change. By Kris Hutton, Director of Product Management, ACL , 9/26/20180 comments | Read | Post a Comment
Nghia Hoang Pho, who illegally took home classified NSA information, also sentenced to three years of supervised release after prison term. By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/25/20180 comments | Read | Post a Comment
Microsoft, Adobe, and SAP will enable a common data model in a Microsoft Azure-based data lake that allows for interoperability of data among platforms from all three companies.By Jessica Davis Senior Editor, Enterprise Apps, 9/25/20180 comments | Read | Post a Comment
As more business processes move toward real-time and near-real-time, companies are finding themselves with skill shortages. One good way to fill the gaps is with "gig workers" who can be scaled up or down as required.By Lisa Morgan Freelance Writer, 9/25/20180 comments | Read | Post a Comment
Women play an important role in building an innovative workforce, so it’s critical to support to the next generation of women technologists and empower their careers. By Madhu Venkatesh, Senior Director, Software Engineering, Workday , 9/25/20180 comments | Read | Post a Comment
The change is a complete departure from Google's previous practice of keeping sign-in for Chrome separate from sign-ins to any Google service.By Jai Vijayan Freelance writer, 9/24/20181 Comment | Read | Post a Comment
At Ignite 2018, security took center stage as Microsoft rolled out new security services and promised an end to passwords for online apps.By Kelly Sheridan Staff Editor, Dark Reading, 9/24/20180 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
The Next Generation of IT SupportThe workforce is changing as businesses become global and technology erodes geographical and physical barriers.IT organizations are critical to enabling this transition and can utilize next-generation tools and strategies to provide world-class support regardless of location, platform or device
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.