Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.By Cynthia Harvey Contributor, NetworkComputing, 10/17/20170 comments | Read | Post a Comment
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.By Kelly Sheridan Associate Editor, Dark Reading, 10/13/20171 Comment | Read | Post a Comment
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/11/201712 comments | Read | Post a Comment
If your organization doesnít have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.By Cynthia Harvey Contributor, NetworkComputing, 10/11/20170 comments | Read | Post a Comment
New reports today say it was a National Security Agency employee, not a a contractor, whose home machine running Kaspersky Lab antivirus was hacked for classified files. By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/6/20170 comments | Read | Post a Comment
Classified information and hacking tools from the US National Security Agency landed in the hands of Russian cyberspies, according to a Wall Street Journal report.By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/5/201714 comments | Read | Post a Comment
DevOps may be up and running for your enterprise. Taking the time to integrate security will keep it that way. By Kiran Chitturi, CTO Architect, Sungard Availability Services , 10/5/20170 comments | Read | Post a Comment
The Equifax data breach should open our eyes to the issue of explicit consent, a concept our peers in Europe are dealing with now.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/4/20170 comments | Read | Post a Comment
Cybersecurity initiatives for government agencies -- in fact, other organizations, too -- have to be proactive and iterative.By Will Ash, Senior Director of Security, U.S. Public Sector, Cisco , 9/29/20170 comments | Read | Post a Comment
Is artificial intelligence the same thing as machine learning? And what is a neural network? This slideshow explains fundamental AI terminology in everyday terms.By Cynthia Harvey Contributor, NetworkComputing, 9/28/20170 comments | Read | Post a Comment
California legislators this month approved a bill prohibiting state universities from contracting for services performed by workers outside of the United States that would displace California employees.By Patrick Thibodeau Freelance Reporter, 9/27/20172 comments | Read | Post a Comment
Young people canít ignore the news. Data breaches are everywhere and theyíre beginning to realize that itís up to them to keep our personal and national information private.
By Emily Johnson Digital Content Editor, InformationWeek, 9/21/20171 Comment | Read | Post a Comment
Three industry leaders took the stage at SAS Analytics Experience and provided broad perspectives on how far we've come in analytics over the last 10 years and where we are today.By Jessica Davis Senior Editor, Enterprise Apps, 9/20/20170 comments | Read | Post a Comment
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.By Jai Vijayan Freelance writer, 9/20/20172 comments | Read | Post a Comment
Analytics thought leader Tom Davenport revisits Competing on Analytics, 10 years after his book on the topic was originally published. We ask him what has changed in that time during this interview.By Jessica Davis Senior Editor, Enterprise Apps, 9/13/20170 comments | Read | Post a Comment
The already-devastating hurricane season highlights the need for predictive analytical models that account for exceptional events.By Jen Underwood Impact Analytix, 9/7/20171 Comment | Read | Post a Comment
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.