security and risk strategy - InformationWeek
IoT
IoT
IT Leadership // Security & Risk Strategy
News & Commentary
Management Tools Bring Structure to Multi-Cloud Environments
John Edwards, Technology Journalist & Author
Satire
New tools help enterprises organize and maximize their expanding multiple cloud infrastructure.
By John Edwards Technology Journalist & Author, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
15 Highest-Paying Tech Jobs for 2018
Cynthia Harvey, Contributor, NetworkComputing
News
Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.
By Cynthia Harvey Contributor, NetworkComputing, 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
10 Steps Enterprises Need to Take to Comply with GDPR
Cynthia Harvey, Contributor, NetworkComputing
News
If your organization doesnít have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.
By Cynthia Harvey Contributor, NetworkComputing, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
AIM Was a Pioneer in Collaboration
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
News
Now 20 years old, AOL Instant Messenger is quietly heading to software's trash heap.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/10/2017
Comment2 comments  |  Read  |  Post a Comment
How to Maintain Security when Rolling out DevOps
Guest Commentary, Guest Commentary
Commentary
DevOps may be up and running for your enterprise. Taking the time to integrate security will keep it that way.
By Kiran Chitturi, CTO Architect, Sungard Availability Services , 10/5/2017
Comment0 comments  |  Read  |  Post a Comment
Cyberthreats: Stay Ahead of Them with a Proactive Strategy
Guest Commentary, Guest Commentary
Commentary
To mitigate the risks presented by more aggressive cyberthreats, organizations need to get out in front of those threats.
By Karin Ratchinsky, director of healthcare strategy, Level 3 , 10/4/2017
Comment0 comments  |  Read  |  Post a Comment
One More Reason to Care about the Equifax Data Breach
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
The Equifax data breach should open our eyes to the issue of explicit consent, a concept our peers in Europe are dealing with now.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/4/2017
Comment0 comments  |  Read  |  Post a Comment
Moving the Cloud Closer to the Business
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
We will soon reach the point where connectivity to cloud resources is going to become a serious issue in terms of real-time computing functions. So, how do we bring the cloud closer to us?
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 10/2/2017
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Should Be Chess, Not Checkers
Guest Commentary, Guest Commentary
Commentary
Cybersecurity initiatives for government agencies -- in fact, other organizations, too -- have to be proactive and iterative.
By Will Ash, Senior Director of Security, U.S. Public Sector, Cisco , 9/29/2017
Comment0 comments  |  Read  |  Post a Comment
It's a New, Challenging World for Data Governance
John Edwards, Technology Journalist & Author
Commentary
Data governance strategy is rapidly shifting from the defense to the offense.
By John Edwards Technology Journalist & Author, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
World Vision Takes on Security for the Good of Children
Emily Johnson, Digital Content Editor, InformationWeek
CommentaryVideo
Ed Anderson, Global CIO, World Vision International sat down with Dark Reading editor, Sara Peters, at the InformationWeek News Desk at Interop ITX to talk about their award-winning security strategy.
By Emily Johnson Digital Content Editor, InformationWeek, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
The Cyber Risk of False Confidence
Emily Johnson, Digital Content Editor, InformationWeek
News
Companies are overly confident about their cybersecurity, and itís leaving their data (and maybe yours too), open to some major security risks.
By Emily Johnson Digital Content Editor, InformationWeek, 9/25/2017
Comment0 comments  |  Read  |  Post a Comment
An IT Pro Takes the Dive into Deep Learning
Rich Casselberry, Risk Technologist
Commentary
IT professional Rich Casselberry experimented with deep learning using online tools and came away with interesting results.
By Rich Casselberry Risk Technologist, 9/21/2017
Comment1 Comment  |  Read  |  Post a Comment
Cybersecurity Becomes a Career Choice
Emily Johnson, Digital Content Editor, InformationWeek
News
Young people canít ignore the news. Data breaches are everywhere and theyíre beginning to realize that itís up to them to keep our personal and national information private.
By Emily Johnson Digital Content Editor, InformationWeek, 9/21/2017
Comment1 Comment  |  Read  |  Post a Comment
One Point the Equifax Breach Drives Home
Lisa Morgan, Freelance Writer
News
Equifax blamed its recent high-profile breach on the Apache Struts Web Framework. As software delivery cycles shrink, developers have to rely on more third-party components, libraries and frameworks. When they do, what are their liabilities and responsibilities?
By Lisa Morgan Freelance Writer, 9/18/2017
Comment0 comments  |  Read  |  Post a Comment
3 Tips for Making Better Investments in Security
Andrew Horne, IT Practice Leader, CEB, now Gartner
Commentary
Information securityís role is becoming more strategic, but its approach to making investment decisions hasnít kept pace. To better align security investments with enterprise strategy, IT and security leaders must stay focused on the right risks, add rigor to decision making processes, and give stakeholders opportunities for input.
By Andrew Horne IT Practice Leader, CEB, now Gartner, 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
Cloud Computing Spurs Hybrid Architecture Adoption
John Edwards, Technology Journalist & Author
News
Enterprises turn to the hybrid cloud for disaster recovery, data archiving and other applications.
By John Edwards Technology Journalist & Author, 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
3 Ways Blockchain is Changing Cybersecurity
Guest Commentary, Guest Commentary
Commentary
The tech sector is looking at new uses for blockchain, and information security is one area that holds promise.
By Ralph Tkatchuk, TK Data Sec , 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
12 DevOps Terms You Need to Know
Cynthia Harvey, Contributor, NetworkComputing
News
Before taking that big step into DevOps, here are 12 core DevOps terms you'll want to understand.
By Cynthia Harvey Contributor, NetworkComputing, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
Alexa for the Enterprise? Not Yet, but Itís Coming
Guest Commentary, Guest Commentary
Commentary
Now that you might be accustomed to using Siri, Alexa, Cortana or Google Assistant in your personal life, consider the potential for voice technology in the enterprise.
By Jim Souders, CEO, Adaptiva , 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.