security and risk strategy - InformationWeek
IoT
IoT
IT Leadership // Security & Risk Strategy
News & Commentary
10 Surprising Ways Machine Learning is Being Used Today
Guest Commentary, Guest Commentary
Commentary
As machine learning technologies evolve developers in a range of fields are finding innovative ways to solve challenges.
By Roxanna "Evan" Ramzipoor, Sift Science , 12/13/2017
Comment0 comments  |  Read  |  Post a Comment
5 Survival Tactics for Enterprise CIOs in 2018
Jessica Davis,  Senior Editor, Enterprise Apps
News
Longtime tech industry pundit Tim O'Reilly sat down with InformationWeek to talk about the future of business, society, and the enterprise. Here's what he says enterprises must do to compete in a changing business environment.
By Jessica Davis Senior Editor, Enterprise Apps, 12/11/2017
Comment0 comments  |  Read  |  Post a Comment
Five Emerging Requirements Impacting Hybrid Cloud Strategies
Guest Commentary, Guest Commentary
Commentary
As companies turn to the hybrid cloud to future-proof business and innovate faster, there are some emerging needs that they should address.
By Kip Compton, VP, Cloud Platforms & Solutions, Cisco , 12/8/2017
Comment0 comments  |  Read  |  Post a Comment
IT Versus the Organization
John Edwards, Technology Journalist & Author
News
There are significant gaps in how IT professionals and business leaders view issues such as aligning tech with business goals. Experts share some thoughts on how to close the gaps.
By John Edwards Technology Journalist & Author, 12/8/2017
Comment0 comments  |  Read  |  Post a Comment
The Hidden Costs of Open Source Security Software
Guest Commentary, Guest Commentary
Commentary
Open source software isn't free, whether looked at in terms of hard dollars or in missed opportunities.
By Andy Jordan, Special Project Lead, Mosaic451 , 12/8/2017
Comment0 comments  |  Read  |  Post a Comment
Hybrid Cloud – You’re Doing It Wrong
Guest Commentary, Guest Commentary
Commentary
As organizations move to hybrid clouds they have to adjust their thinking and how they look at key concepts.
By Mark Baker, Field Product Manager, Canonical , 12/7/2017
Comment0 comments  |  Read  |  Post a Comment
How IT Leaders Can Prepare for 2018
Guest Commentary, Guest Commentary
Commentary
As IT executives set out their plans for 2018, three key technology concepts should be top priorities.
By Sajid Mohamedy, Vice President, Strategy & Operations, Nisum , 12/1/2017
Comment0 comments  |  Read  |  Post a Comment
Clear the Barriers to DevTestOps
Guest Commentary, Guest Commentary
Commentary
A key to a successful DevOps initiative is ensuring that team members stay involved at all stages of the development, test, and deployment cycle.
By Lubos Parobek, VP of Product, Sauce Labs , 11/30/2017
Comment0 comments  |  Read  |  Post a Comment
IT Job Satisfaction on the Upswing
Emily Johnson, Digital Content Editor, InformationWeek
News
IT was once viewed as a back-office function, filled with disgruntled, reserved workers, but the view of the IT role and worker is changing, and it’s showing in IT job satisfaction levels.
By Emily Johnson Digital Content Editor, InformationWeek, 11/29/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR: Achieving Compliance, Earning Trust
Guest Commentary, Guest Commentary
Commentary
Following the privacy rules set out in the EU's GDPR isn't just about compliance; it shows customers and others that they can trust your company.
By Sooji Seo, Global Privacy Program Director, Dell , 11/28/2017
Comment0 comments  |  Read  |  Post a Comment
Share the Cost of Secure Application Development
Guest Commentary, Guest Commentary
Commentary
The cost of protecting applications from cyberattacks is climbing fast. So, it's time for business units to help cover the pricetag.
By Amit Ashbel, Cybersecurity evangelist, Checkmarx , 11/22/2017
Comment0 comments  |  Read  |  Post a Comment
Openness – The Key to Rapid Change in the Digital Era
Andrew Horne, IT Practice Leader, CEB, now Gartner
Commentary
Change is never easy, particularly in an age of constant change. So, consider new ways to implement change and smooth the process.
By Andrew Horne IT Practice Leader, CEB, now Gartner, 11/21/2017
Comment0 comments  |  Read  |  Post a Comment
Make Cybersecurity About Innovation and Growth
Guest Commentary, Guest Commentary
Commentary
Cybersecurity doesn’t have to be just a cost of doing business. With the right approach, it can both protect while creating new levels of business growth.
By Jim Poole, Vice President for Global Ecosystem Development, Equinix , 11/16/2017
Comment0 comments  |  Read  |  Post a Comment
Tech Vendors to Watch in 2018
Susan Fogarty, Editor in Chief
Satire
Browse through the hottest vendors in cloud, DevOps, infrastructure, security, and data and analytics.
By Susan Fogarty Editor in Chief, 11/14/2017
Comment0 comments  |  Read  |  Post a Comment
Are DevOps and Software Quality Incompatible?
Guest Commentary, Guest Commentary
Commentary
The DevOps concept's focus on speed to market and continuous release can leave gaps in software quality. Understand which ones you can live with, and which are critical.
By Mary Shacklett, founder and owner of Transworld Data , 11/9/2017
Comment0 comments  |  Read  |  Post a Comment
How to Hire Diverse Talent in Security
Emily Johnson, Digital Content Editor, InformationWeek
SatireVideo
Juliet Okafor, VP of business development at Fortress Information Security, shared why she thinks the security talent shortage is a myth.
By Emily Johnson Digital Content Editor, InformationWeek, 11/8/2017
Comment0 comments  |  Read  |  Post a Comment
The Cloud: We're Not in 2012 Any More
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
News
Forrester's upcoming cloud 2018 predictions report, scheduled for release tomorrow, highlights just how dramatic developments in security, analytics, and applications tools have advanced the cloud.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 11/6/2017
Comment0 comments  |  Read  |  Post a Comment
Embrace the Cyber Security-Physical Security Nexus
Guest Commentary, Guest Commentary
Commentary
It's time for the IT security team and the physical security team to work together on a "cyber-physical" security strategy.
By Nitin Natarajan, Principal, Cadmus , 11/6/2017
Comment0 comments  |  Read  |  Post a Comment
Securing Travel and Trade with Blockchain
Guest Commentary, Guest Commentary
Commentary
Among the growing number of potential applications for blockchain is border management and security.
By James Canham, managing director, Accenture Border Services , 10/27/2017
Comment0 comments  |  Read  |  Post a Comment
Quantum Computing Brings Promise and Threats
Lisa Morgan, Freelance Writer
News
Faster, better, potentially dangerous. Quantum computers will push way past the boundaries of traditional computers, but to what ends? We explore some of the possibilities.
By Lisa Morgan Freelance Writer, 10/26/2017
Comment2 comments  |  Read  |  Post a Comment
More Stories
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.