This form of machine learning continues to grow rapidly. Here's what you need to know as you consider whether to implement deep learning in your organization.By Cynthia Harvey Contributor, NetworkComputing, 2/20/20190 comments | Read | Post a Comment
New data from CrowdStrike's incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organization.By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/19/20190 comments | Read | Post a Comment
InformationWeek and Interop are developing a survey-based report on the State of IT in 2019.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 2/19/20190 comments | Read | Post a Comment
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers. By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/13/20190 comments | Read | Post a Comment
Artificial intelligence is the brains behind self-driving cars, cancer research, and more. Now the White House has created an initiative to foster this technology.By Jessica Davis Senior Editor, Enterprise Apps, 2/12/20190 comments | Read | Post a Comment
The promise of AI is real, but the potential dangers are also just as real. In the end countermeasures will alleviate the dangers.By Jim Carnes, Chief Security Architect, Ciena , 2/12/20190 comments | Read | Post a Comment
AI facial recognition algorithms are far from perfect. Here's what you should know if your enterprise is considering deploying this technology.By Jessica Davis Senior Editor, Enterprise Apps, 2/11/20190 comments | Read | Post a Comment
An Illinois court ruling underscores the importance of providing notice of biometric data collection and use. Violate the law and your company could be sued.By Lisa Morgan Freelance Writer, 2/1/20190 comments | Read | Post a Comment
A new encryption-focused law in Australia highlights the need for all parties to come together to identify a solution that protects privacy, e-commerce, and people and institutions.By Marc Rogers, Executive Director of Cybersecurity, Okta , 1/17/20190 comments | Read | Post a Comment
But this new development unlikely to do much to clear government suspicions about security vendor's ties to Russian intelligence, analyst says.By Jai Vijayan Freelance writer, 1/9/20190 comments | Read | Post a Comment
National Counterintelligence and Security Center (NCSC) released free online security awareness materials for businesses to defend against nation-state hackers.By Steve Zurier Freelance Writer, 1/9/20192 comments | Read | Post a Comment
Top reward for iOS remote exploit hits $2 million, as companies who sell exploits to national governments have to offer more money to attract researchers to tackle increasingly secure software.By Robert Lemos Technology Journalist/Data Researcher, 1/7/20190 comments | Read | Post a Comment
New court document shows law enforcement suspected possible involvement of Harold Martin in Shadow Brokers' release of classified NSA hacking tools.
By Jai Vijayan Freelance writer, 1/2/20192 comments | Read | Post a Comment
For all the market research numbers floating around about cloud computing, what is missing is advice on what IT organizations should be doing with IaaS, SaaS, and other cloud concepts.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 12/31/20180 comments | Read | Post a Comment
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!