Critical infrastructure, entertainment, finance, healthcare, telecoms, among recent targets of the Lazarus Group, aka Hidden Cobra.By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/26/20180 comments | Read | Post a Comment
When it comes to software, why choose out-of-the-box plain vanilla when there’s a rainbow of other flavors that you can choose from and swirl together? By Emily Johnson Digital Content Editor, InformationWeek, 4/26/20180 comments | Read | Post a Comment
IT organizations are focused on the cloud right now with automation and big data analytics also ranking pretty high on their to-do lists. AI, machine learning, and blockchain are down very low on the list of priorities.By Jessica Davis Senior Editor, Enterprise Apps, 4/26/20180 comments | Read | Post a Comment
While Yahoo senior management and legal team knew of the breach, the company failed to conduct due diligence for disclosing it to investors, the agency rules. By Dark Reading Staff , 4/25/20181 Comment | Read | Post a Comment
Investigators arrested the admins of Webstresser, the world's largest DDoS marketplace reportedly responsible for more than four million attacks.By Kelly Sheridan Staff Editor, Dark Reading, 4/25/20180 comments | Read | Post a Comment
Unrealistic entry-level job requirements, black-hoodie hacker image problems are among the 'uncomfortable conversations' needed to remedy cybersecurity's diversity gap.By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/25/20185 comments | Read | Post a Comment
As AI is woven deeper into different types of software and business processes, the success of it, particularly from customer experience and personalization standpoints, depends on its ability to recognize emotion and act accordingly. Will machines be able to achieve artificial empathy? Have they already? Following are some of the challenges and opportunities.By Lisa Morgan Freelance Writer, 4/25/20180 comments | Read | Post a Comment
While the rationale for modernizing IT is often apparent, sometimes the messaging and positioning on the part of the IT group is just as important. By Tom Pohlmann, Chief Marketing Officer, AHEAD , 4/25/20180 comments | Read | Post a Comment
Today's attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.By Kelly Sheridan Staff Editor, Dark Reading, 4/24/20182 comments | Read | Post a Comment
What is it that enables some IT leaders to fly in the face of stress while others crumble? It’s called resilience, and it’s a skill, not a talent. By Emily Johnson Digital Content Editor, InformationWeek, 4/24/20180 comments | Read | Post a Comment
IT executives know that the cloud is changing everything, but they might forget that they have to update their disaster recovery plan accordingly.By Mary Shacklett, founder and owner of Transworld Data , 4/24/20180 comments | Read | Post a Comment
It's a mistake for companies to view compliance with GDPR as just a financial burden. There are real benefits to be had in understanding and protecting customer data.By Dimitri Sirota, CEO and Co-founder, BigID , 4/23/20180 comments | Read | Post a Comment
Looking to learn from other people's experience and mistakes to leapfrog ahead in your career? We asked top leadership experts for their wisdom. Here's what they said.By Jessica Davis Senior Editor, Enterprise Apps, 4/23/20180 comments | Read | Post a Comment
This type of machine learning is going to become increasingly important in analytics and enterprise applications.By Cynthia Harvey Contributor, NetworkComputing, 4/23/20180 comments | Read | Post a Comment
Threat actors generate, launder, spend, and reinvest more than $1.5 trillion in illicit funds, according to a new study on cybercrime's 'web of profit.'By Kelly Sheridan Staff Editor, Dark Reading, 4/20/20180 comments | Read | Post a Comment
Security practitioners must build trusted relationships with developers and within cross-functional DevOps teams to get themselves embedded into continuous software delivery processes.By Ericka Chickowski Contributing Writer, Dark Reading, 4/20/20180 comments | Read | Post a Comment
How can you apply machine learning and AI to predict the success of a new idea? Will that old data you have work? Here's a different approach.By Jessica Davis Senior Editor, Enterprise Apps, 4/20/20180 comments | Read | Post a Comment
Speakers at the RSA Conference this week shared some advice on how business leaders can deal with hackers who are trying to extort payments from an organization.By Steve Kovsky Technology Journalist, 4/20/20180 comments | Read | Post a Comment
Dark Reading caught up with Microsoft's Bret Arsenault to discuss intelligence, identity, and the need to leverage more diverse datasets.By Kelly Sheridan Staff Editor, Dark Reading, 4/19/20182 comments | Read | Post a Comment
The cloud is much more than on-demand computing and storage resources. It is the foundation for a whole new world of exciting and smart ways of doing business.By Bob Weiler, Executive Vice President, Oracle Global Business Units , 4/19/20180 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
Cybersecurity Strategies for the Digital EraAt its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.