Following the theft of millions of dollars from Bangladesh Bank via the international financial messaging system SWIFT, US banking regulators have outlined steps to tighten cyber-security at the nation's banks.By Dawn Kawamoto Freelance Writer and Editor, 8/26/20163 comments | Read | Post a Comment
The Wireless Broadband Alliance's City WiFi Roaming project aims to provide public WiFi users in cities around the globe with the ability to roam between different public wireless networks. Some of the host cities that are part of this public, private partnership include New York, San Francisco, and San Jose.By Nathan Eddy Freelance Writer, 8/25/20161 Comment | Read | Post a Comment
InfoArmor says the attackers who stole a half-billion Yahoo user accounts were seasoned cybercriminals who later sold the booty to an Eastern European nation-state.By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/29/20160 comments | Read | Post a Comment
The 185 IT professionals at the Washington Department of Corrections support the needs of approximately 8,000 corrections officers and staffers and track some 33,000 assets -- including everything from iPhones to Tasers. Here's the story of how the organization revamped its IT support and service management tools and processes -- and the surprising culture changes that came about as a result. By Susan Nunziata Editorial Director, 9/29/20160 comments | Read | Post a Comment
BlackBerry, which dominated the mobile market during the dawn of the smartphone era, is no longer making hardware. Instead, it will focus on software, management, and security, which moves the company deeper into the enterprise.By Scott Ferguson Director of Audience Development, UBM Tech, 9/28/20162 comments | Read | Post a Comment
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate.By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/20162 comments | Read | Post a Comment
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future. By InformationWeek Staff , 9/27/20161 Comment | Read | Post a Comment
Rand taps multiple data sources to calculate that cyber incidents cost firms a scant 0.4% of annual revenues, on average. By Terry Sweeney Contributing Editor, 9/21/20162 comments | Read | Post a Comment
Governors, other state officials more aware of cyber threats, but confidence gap exists between IT and business managers, new Deloitte-National State Chief Information Officers (NASCIO) study finds.By Rutrell Yasin Freelance Writer, 9/20/20166 comments | Read | Post a Comment
DHS official 'confident' in electoral system security, but offers security assistance to localities and urges vigilance.By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/19/20160 comments | Read | Post a Comment
Oracle Application Users Group (OAUG) incoming president Alyssa Johnson provided a cloud reality check about how quickly her organization's members are adopting cloud solutions.By Jessica Davis Senior Editor, Enterprise Apps, 9/19/20161 Comment | Read | Post a Comment
The public cloud market is expected to grow more than 17% by the end of 2016 to total of over $208 billion, according to new projections from Gartner. The two most popular services are IaaS and SaaS for IT departments looking to save money.By Scott Ferguson Director of Audience Development, UBM Tech, 9/16/20165 comments | Read | Post a Comment
Demand for data engineers is on the rise in enterprise, particularly in those organizations that aspire to be the next Uber or Airbnb. Here's a look at this quickly growing job category within IT.By Jessica Davis Senior Editor, Enterprise Apps, 9/15/20160 comments | Read | Post a Comment
It's smart for businesses to strengthen their relationships with law enforcement before a cyberattack takes place. Whom should they contact, and how will it help after a breach?By Kelly Sheridan Associate Editor, InformationWeek, 9/14/20162 comments | Read | Post a Comment
The US Coast Guard is collaborating with experts in academia to help investigate the expensive problem of hoax callers. Machine learning is playing a vital role in their efforts. By Jessica Davis Senior Editor, Enterprise Apps, 9/14/20162 comments | Read | Post a Comment
A strong disaster recovery plan is key to keeping your business going in the face of a very bad, no good, horrible day. Here are nine steps IT pros should not skip in their planning and preparation for the worst.By Curtis Franklin Jr. Executive Editor, Technical Content, 9/14/20160 comments | Read | Post a Comment
Whether you are an IT pro looking to add data analytics and data science skills to your repertoire, or you are looking to make a career change from IT to the data analytics field, here are seven tips that can give you a head start. By Jessica Davis Senior Editor, Enterprise Apps, 9/13/20162 comments | Read | Post a Comment
Congressional investigation sheds more light on what went down in the massive Office of Personnel Management breach, says data theft was preventable.By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/7/20162 comments | Read | Post a Comment
Aligning IT and business units sounds fantastic in theory. But when the rubber meets the road, IT leaders face unique challenges as they strive to engage and collaborate with business-side colleagues. InformationWeek surveyed 100 IT leaders about their biggest mistakes. Here's what they revealed about the ever-evolving relationship between business and IT.By Susan Nunziata Editorial Director, 9/6/20161 Comment | Read | Post a Comment
Here's a look at enterprise plans for implementation of NoSQL databases, and some of the top vendors providing this technology.By Jessica Davis Senior Editor, Enterprise Apps, 9/5/20163 comments | Read | Post a Comment
The smartphone market is expected to hit a big slowdown this year, with shipments growing by less than 2% -- a dramatic decline from 2015, according to new numbers from IDC. For IT departments managing fleets of mobile devices, the focus will likely be on only two operating systems: Android and iOS.By Scott Ferguson Director of Audience Development, UBM Tech, 9/2/20165 comments | Read | Post a Comment
Time to Reconsider Enterprise Email StrategyCost, time, and risk. It's the demand trifecta vying for the attention of both technology professionals and attorneys charged with balancing the expectations of their clients and business units with the hard reality of the current financial and regulatory climate. Sometimes, organizations assume high levels of risk as a result of their inability to meet the costs involved in data protection. In other instances, it's time that's of the essence, as with a data breach.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 25, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."