New data from CrowdStrike's incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organization.By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/19/20190 comments | Read | Post a Comment
Here are some practical ways to keep your company safe as Uncle Sam comes calling.By Steve Zurier Freelance Writer, 2/19/20190 comments | Read | Post a Comment
When implementing open source software, look beyond the license terms to understand who is driving change on the software.By Ben Slater, CPO, Instaclustr , 2/19/20190 comments | Read | Post a Comment
As it gets easier and easier to deploy cloud-native apps, maintaining order increasingly becomes a challenge.By Joao-Pierre S. Ruth Senior Writer, 2/19/20190 comments | Read | Post a Comment
InformationWeek and Interop are developing a survey-based report on the State of IT in 2019.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 2/19/20190 comments | Read | Post a Comment
It's time for IT leaders to recognize that the IT group is crucial to their companies' future growth and success, and to let the business know that IT is there to help.By David Politis, CEO and Founder, BetterCloud , 2/18/20190 comments | Read | Post a Comment
Organizations tend to get different results with digital transformation. To realize business value, first realize that transformation isn’t just about tech.By Lisa Morgan Freelance Writer, 2/18/20190 comments | Read | Post a Comment
IBM is leveraging Kubernetes to enable its Watson AI to run on public clouds AWS, Google, and Microsoft Azure. The move signals a shift in strategy for IBM.By Jessica Davis Senior Editor, Enterprise Apps, 2/15/20190 comments | Read | Post a Comment
When TaylorMade Golf spun off from Adidas, it had to separate all its operations, including IT, and used the opportunity to try the Oracle Autonomous Database.By Jessica Davis Senior Editor, Enterprise Apps, 2/15/20190 comments | Read | Post a Comment
A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains.By Robert Lemos Technology Journalist/Data Researcher, 2/14/20190 comments | Read | Post a Comment
Carmaker's open source car-hacking tool platform soon will be available to the research community.By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/14/20190 comments | Read | Post a Comment
In the weeks leading up to Valentine's Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails.By Kelly Sheridan Staff Editor, Dark Reading, 2/14/20192 comments | Read | Post a Comment
Enterprises that hold out to hire DevOps unicorns may be overlooking worthwhile workers who are already available.By Joao-Pierre S. Ruth Senior Writer, 2/14/20190 comments | Read | Post a Comment
The Internet is not fake, but protecting the value derived from online activity must account for social engineering. Here’s why.By Pierre DeBois Founder, Zimana, 2/14/20190 comments | Read | Post a Comment
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers. By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/13/20190 comments | Read | Post a Comment
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/13/20190 comments | Read | Post a Comment
Speed, simplicity, and security underscore their desire, a new study shows.By Steve Zurier Freelance Writer, 2/13/20190 comments | Read | Post a Comment
Both individual employees and their employers need to take action to prepare for a future where people increasingly work alongside machines.By Ravi Kumar S., President, Infosys , 2/13/20190 comments | Read | Post a Comment
Migration to the cloud is part of many transformation plans but it can spiral into expenses that could be avoided.By Joao-Pierre S. Ruth Senior Writer, 2/13/20190 comments | Read | Post a Comment
With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software.By Robert Lemos , 2/12/20190 comments | Read | Post a Comment
Security and Privacy vs. Innovation: The Great Balancing ActThis InformationWeek IT Trend Report will help you better understand and address the growing challenge of balancing the need for innovation with the real-world threats and regulations.
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.