InformationWeek, serving the information needs of the Business Technology Community
IoT
IoT
How to Operationalize Privacy and Data Governance for AI
Let's Make a Deal: Negotiating with IT Vendors
How Content Creation and Sci-Fi Combine with Real World AI
15 Best Places to Work in Tech for 2019
8 Challenges DevOps Faces Today
News & Commentary
Topspin and Terabytes: IBM Ups Its Cloud Game at the Masters
Joao-Pierre S. Ruth, Senior Writer
News
Lessons learned from working with sports data can inform new ways of addressing enterprise DevOps, cloud, and AI needs.
By Joao-Pierre S. Ruth Senior Writer, 4/24/2019
Comment0 comments  |  Read  |  Post a Comment
Sharpen Your Business Intelligence Blade
Guest Commentary, Guest Commentary
Commentary
Managing and monitoring your digital infrastructure doesnít have to painful. There are steps you can take to give your operational intelligence an edge.
By Eric Kaplan, CTO, Ahead , 4/24/2019
Comment0 comments  |  Read  |  Post a Comment
Exploits for Adobe Vulnerabilities Spiked in 2018
Jai Vijayan, Freelance writer
News
With Flash Player on way out, attackers are renewing their focus on Acrobat Reader, RiskSense found.
By Jai Vijayan Freelance writer, 4/23/2019
Comment0 comments  |  Read  |  Post a Comment
Migrating to the Cloud? Avoid These Five Pitfalls
Guest Commentary, Guest Commentary
Commentary
Successful cloud migration often means introducing and adopting a new common language throughout an organization. But there are some guidelines to follow.
By Stefano Bellasio, CEO, Cloud Academy , 4/23/2019
Comment0 comments  |  Read  |  Post a Comment
How TensorFlow Enhances Cloud Marketing Strategies
Pierre DeBois, Founder, Zimana
Commentary
TensorFlow, a machine learning programming library, has been available for Python, but a new JavaScript version introduced machine learning in the browser.
By Pierre DeBois Founder, Zimana, 4/23/2019
Comment0 comments  |  Read  |  Post a Comment
Are You Ready to Manage AI Risks?
Lisa Morgan, Freelance Writer
Commentary
Most companies have IT-related risk management programs, but they need to be updated to include the nuances of AI.
By Lisa Morgan Freelance Writer, 4/23/2019
Comment0 comments  |  Read  |  Post a Comment
1 in 4 Workers Are Aware Of Security Guidelines Ė but Ignore Them
Steve Zurier, Freelance Writer
News
Even more are knowingly connecting to unsecure networks and sharing confidential information through collaboration platforms, according to Symphony Communication Services.
By Steve Zurier Freelance Writer, 4/23/2019
Comment1 Comment  |  Read  |  Post a Comment
FBI: $2.7 Billion in Losses to Cyber-Enabled Crimes in 2018
Dark Reading Staff,
News
Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation.
By Dark Reading Staff , 4/22/2019
Comment1 Comment  |  Read  |  Post a Comment
WannaCry Hero Hutchins Pleads Guilty to Malware Charges
Kelly Sheridan, Staff Editor, Dark Reading
News
Marcus Hutchins, the security researcher who helped halt the spread of the WannaCry attack, pleads guilty to two charges related to writing malware.
By Kelly Sheridan Staff Editor, Dark Reading, 4/22/2019
Comment0 comments  |  Read  |  Post a Comment
How to Operationalize Privacy and Data Governance for AI
Lisa Morgan, Freelance Writer
Commentary
Enterprise approaches to data privacy and governance need a refresh when it comes to AI because things can go wrong at scale, fast.
By Lisa Morgan Freelance Writer, 4/22/2019
Comment0 comments  |  Read  |  Post a Comment
Data Privacy, Transparency Get New Weapon
Jessica Davis,  Senior Editor, Enterprise Apps
News
Osano and its browser plugin, Privacy Monitor, aim to provide consumers with transparency regarding consumer data privacy policies. The company will release data supply chain tools for companies later this year.
By Jessica Davis Senior Editor, Enterprise Apps, 4/22/2019
Comment0 comments  |  Read  |  Post a Comment
Corporate Responsibility: A Key to Weathering a Breach
Guest Commentary, Guest Commentary
Commentary
How a company handles a breach speaks directly to its character during one of the most high-profile times of its history.
By Joseph Perry, Director of Research, Cybrary , 4/22/2019
Comment0 comments  |  Read  |  Post a Comment
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher
News
Mueller report finds that in July 2016, after then-candidate Donald Trump publicly called for Russia to "find the 30,000 emails," Russian agents targeted Hillary Clinton's personal office with cyberattacks.
By Robert Lemos Technology Journalist/Data Researcher, 4/19/2019
Comment11 comments  |  Read  |  Post a Comment
Q&A: Gadi Singer on Intelís AI Plans for Enterprise
Joao-Pierre S. Ruth, Senior Writer
News
The vice president of Intel's AI products group talks evolution and new applications for artificial intelligence.
By Joao-Pierre S. Ruth Senior Writer, 4/19/2019
Comment0 comments  |  Read  |  Post a Comment
Keys to a Successful IoT Deployment
Guest Commentary, Guest Commentary
Commentary
IoT is growing rapidly, but lingering connectivity, security, and data storage concerns will need to be resolved to guarantee its continued flourishing.
By Albert A. Ahdoot, Director of Business Development, Colocation America , 4/19/2019
Comment0 comments  |  Read  |  Post a Comment
6 Takeaways from Ransomware Attacks in Q1
Jai Vijayan, Freelance writer
News
Customized, targeted ransomware attacks were all the rage.
By Jai Vijayan Freelance writer, 4/18/2019
Comment1 Comment  |  Read  |  Post a Comment
How to Raise the Level of AppSec Competency in Your Organization
Sammy Migues, Principal Scientist, Synopsys
Commentary
Improving processes won't happen overnight, but it's not complicated either.
By Sammy Migues Principal Scientist, Synopsys, 4/18/2019
Comment0 comments  |  Read  |  Post a Comment
GoT Guide to Cybersecurity: Preparing for Battle During a Staffing Shortage
Orion Cassetto, Senior Product Maester, Exabeam
Commentary
Faced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today's beleaguered CISOs.
By Orion Cassetto Senior Product Maester, Exabeam, 4/18/2019
Comment0 comments  |  Read  |  Post a Comment
How Content Creation and Sci-Fi Combine with Real World AI
Joao-Pierre S. Ruth, Senior Writer
News
Paying attention to creative resources might drive innovations that enterprises can apply to artificial intelligence.
By Joao-Pierre S. Ruth Senior Writer, 4/18/2019
Comment0 comments  |  Read  |  Post a Comment
Seven Ways to Jump-Start AI
Guest Commentary, Guest Commentary
Commentary
Artificial intelligence can offer competitive advantages, but itís not easy to drive success without understanding how to overcome the challenges.
By Harsh Dhundia, Director, Pace Harmon , 4/18/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Commentary
The Staying Power of Legacy Systems
Mary E. Shacklett, Mary E. Shacklett,  4/15/2019
Commentary
Q&A: Red Hat's Robert Kratky Discusses Essentials of Docs
Joao-Pierre S. Ruth, Senior Writer,  4/15/2019
Commentary
How Cloud Shifts Security Balance of Power to the Good Guys
Guest Commentary, Guest Commentary,  4/11/2019
Register for InformationWeek Newsletters
White Papers
Current Issue
A New World of IT Management in 2019
This IT Trend Report highlights how several years of developments in technology and business strategies have led to a subsequent wave of changes in the role of an IT organization, how CIOs and other IT leaders approach management, in addition to the jobs of many IT professionals up and down the org chart.
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Video
Sponsored Video
Slideshows
Twitter Feed
Flash Poll