Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.By Cynthia Harvey Contributor, NetworkComputing, 10/17/20170 comments | Read | Post a Comment
If your organization doesnít have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.By Cynthia Harvey Contributor, NetworkComputing, 10/11/20170 comments | Read | Post a Comment
Now 20 years old, AOL Instant Messenger is quietly heading to software's trash heap.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/10/20172 comments | Read | Post a Comment
DevOps may be up and running for your enterprise. Taking the time to integrate security will keep it that way. By Kiran Chitturi, CTO Architect, Sungard Availability Services , 10/5/20170 comments | Read | Post a Comment
To mitigate the risks presented by more aggressive cyberthreats, organizations need to get out in front of those threats.By Karin Ratchinsky, director of healthcare strategy, Level 3 , 10/4/20170 comments | Read | Post a Comment
The Equifax data breach should open our eyes to the issue of explicit consent, a concept our peers in Europe are dealing with now.By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/4/20170 comments | Read | Post a Comment
We will soon reach the point where connectivity to cloud resources is going to become a serious issue in terms of real-time computing functions. So, how do we bring the cloud closer to us?By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 10/2/20170 comments | Read | Post a Comment
Cybersecurity initiatives for government agencies -- in fact, other organizations, too -- have to be proactive and iterative.By Will Ash, Senior Director of Security, U.S. Public Sector, Cisco , 9/29/20170 comments | Read | Post a Comment
Ed Anderson, Global CIO, World Vision International sat down with Dark Reading editor, Sara Peters, at the InformationWeek News Desk at Interop ITX to talk about their award-winning security strategy. By Emily Johnson Digital Content Editor, InformationWeek, 9/26/20170 comments | Read | Post a Comment
Companies are overly confident about their cybersecurity, and itís leaving their data (and maybe yours too), open to some major security risks.
By Emily Johnson Digital Content Editor, InformationWeek, 9/25/20170 comments | Read | Post a Comment
IT professional Rich Casselberry experimented with deep learning using online tools and came away with interesting results.By Rich Casselberry Risk Technologist, 9/21/20171 Comment | Read | Post a Comment
Young people canít ignore the news. Data breaches are everywhere and theyíre beginning to realize that itís up to them to keep our personal and national information private.
By Emily Johnson Digital Content Editor, InformationWeek, 9/21/20171 Comment | Read | Post a Comment
Equifax blamed its recent high-profile breach on the Apache Struts Web Framework. As software delivery cycles shrink, developers have to rely on more third-party components, libraries and frameworks. When they do, what are their liabilities and responsibilities?By Lisa Morgan Freelance Writer, 9/18/20170 comments | Read | Post a Comment
Information securityís role is becoming more strategic, but its approach to making investment decisions hasnít kept pace. To better align security investments with enterprise strategy, IT and security leaders must stay focused on the right risks, add rigor to decision making processes, and give stakeholders opportunities for input.By Andrew Horne IT Practice Leader, CEB, now Gartner, 9/15/20170 comments | Read | Post a Comment
Now that you might be accustomed to using Siri, Alexa, Cortana or Google Assistant in your personal life, consider the potential for voice technology in the enterprise.By Jim Souders, CEO, Adaptiva , 9/12/20170 comments | Read | Post a Comment
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.