InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States
Our Website:

Latest Content From InformationWeek

Digital Editorial Content: Top IT Trends to Watch in Financial Services

by InformationWeekJul 08, 2016

Download this InformationWeek Tech Digest to learn about the Financial Services IT Trends you need to know about today!


  • How Peer-to-Peer Lending Is Rewriting Tech Rules: Peer-to-peer financial services marketplaces are changing how lenders operate, permanently altering the way financial services firms use information technology in the process.
  • Capital One -- Think Like a Designer, Work Like a Startup: The creation of Capital One Wallet is an example of how a large financial services IT organization can move like a startup and think like a design firm, transforming business expectations in the process.
  • Attacks Heighten Concerns About Financial Services Cybersecurity: Security, performance, agility, and compliance continue to be primary concerns for network administrators in the financial services industry.
  • Financial Services Networks: What's Top of Mind? Security, performance, agility, and compliance continue to be primary concerns for network administrators in the financial services industry.

The information submitted is collected by both UBM and our sponsors. Click here to view our Avere Systems, and Citrix's privacy policies.

This digital issue is sponsored by:

Digital Editorial Content: InformationWeek Elite 100 Tech Digest

by InformationWeekMay 03, 2016

Download this InformationWeek's 2016 Elite 100 special issue, highlighting the leading business technology innovators.


  • Our No. 1 Company: Capital One Financial's IT group thinks like a design firm, works like a startup, and transforms business in the process.
  • Other Companies in the Top Five: Learn about business technology innovation at The Weather Company, Horizon Blue Cross Blue Shield of New Jersey, Penn Medicine, and FedEx Services.
  • The Elite 100 Ranking: Find the 28th annual ranking of the leading US users of business technology in this issue.
  • Business Innovation Award Winners: Ten organizations lead the way this year in security, cloud, mobile, analytics, and more.
  • Decade Award Winners: Discover the 10 companies that have consistently demonstrated IT innovation over the past decade.

The information submitted is collected by both UBM and our sponsors. Click here to view our sponsor privacy policies.

This digital issue is sponsored by:

Digital Editorial Content: InformationWeek Tech Digest: Digital Transformation in Insurance

by InformationWeekMar 01, 2016

This digital issue is sponsored by:

InformationWeek articles included in this issue:

  • 4 Trends Shaping Digital Transformation in Insurance: Insurers no longer have a choice about digital adoption if they want to remain relevant. A comprehensive enterprise-wide digital strategy is fundamental to doing business today.

  • 6 Priorities for Digital Transformation: Find out where insurance companies should focus their digital efforts in order to have the most effective digital strategy.

Digital Editorial Content: InformationWeek Tech Digest: Risk Management

by InformationWeekJan 08, 2016

This digital issue is sponsored by:

InformationWeek articles included in this issue:

  • Knock Down the Barriers to Effective Risk Management: Risk management is a hodgepodge of systems, silos, and poor data collection practices. That isn't how it should be. Stop seeing risk management as a burden and start viewing it as part of your organization's livelihood.

  • Who Can Make a Difference: Risk management isn't only the CIO's problem. A company can be at risk in a number of ways, many of which are beyond the traditional purview of IT. Find out who can make a difference in your risk management strategy.

Research Report: 2015 Strategic Security Survey

by InformationWeekSep 15, 2015

The High Cost of Security Breaches

2014 has been dubbed the “Year of the Data Breach” with millions of records containing personally identifiable information and credit and debit card data siphoned off by cybercriminals. The effect this has on the individuals whose identity, money, or medical records have been taken can be devastating, but what is the impact on the organization whose security defenses failed to keep intruders out?

Fifteen percent of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey suffered a targeted breach or compromise. Fifteen percent of respondents who had a breach or compromise estimated the cost of that breach at between $500,000 and a $1 million, with 6% putting the figure at $5 million or more.

Get all the insight in 2015 Strategic Security Report.

Research Report: How Enterprises Are Attacking the IT Security Challenge

by InformationWeekSep 02, 2015

Enterprise data breaches, new security vulnerabilities, and threats in the mobile and cloud arenas continue to dominate the headlines. Maybe that’s why 46% of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey say that this year they have a bigger information security budget than last year. So how are they going to be investing those extra dollars? Firewalls, email filtering, endpoint protection, and VPNs are again the four most widely deployed security technologies. But 24% of respondents don’t even measure the value of their security investments, so for many enterprises, new investment decisions may be based more on subjective opinion than hard facts.

Information security spending will range from 1% to 10% of this year’s annual IT budget for 51% of our respondents. But for some enterprises, increased spending hasn’t helped much: 15% of our respondents suffered a targeted breach or compromise costing between $500,000 and $1 million, with 6% putting the figure at $5 million or more.

Whitepaper: Hybrid Cloud Survey

by InformationWeekSep 01, 2015

We polled 383 respondents for our Hybrid Cloud Survey to determine the extent of hybrid cloud use in the enterprise.

In this report, we:

>> Look at management complexity, cost volatility, and data protection issues.
>> Examine which workloads to run on public versus private clouds.
>> Discuss compliance, identity, connectivity, and other security questions.

Infographic: SaaS As Innovation Driver?

by InformationWeekJun 23, 2015

Software as a service is the clear No. 1 way enterprises consume cloud. InformationWeek's SaaS Innovation Survey reveals three tips to get the most from SaaS: Make it a popularity contest. Have an escape plan. And remember that identity is the new perimeter.

Research Report: Strategy: Monitoring Security in Cloud Environments

by InformationWeekMar 20, 2015

One of the major reasons enterprises have been hesitant to embrace cloud computing technologies is a lack of visibility. Enterprises need ways to track their data as it travels back and forth to the cloud, as well as a way to ensure that their data is safe in a shared infrastructure.

To benefit from cloud computing and minimize risks to your organization’s data, several key components are required: visibility across infrastructures and applications, isolation of critical services, and regularly audited automated processes for threat detection and mitigation. Working closely with cloud providers, administrators can deliver accountability and audit trails for data events in and out of the cloud so enterprises know exactly what is happening with their data. Cloud providers will have their own monitoring tools to track the performance, continuity and security of all of the components that support service delivery, but organizations must invest in their own systems to monitor physical, virtual and cloud environments. Responsibility for security and monitoring of data critical to daily business operations is ultimately your responsibility, not the provider’s.

In this Dark Reading report, we examine tools and practices that enterprises can use to monitor the security of cloud environments and receive notifications when their data might be at risk.

Research Report: Building a Security Analytics Initiative

by InformationWeekJan 28, 2015

Many security teams empathize with Italian artist Sven Sachsalber, who recently spent 48 hours in a Paris museum looking for a needle in a haystack. At least Sachsalber knew what he was seeking, and the haystack didn't keep increasing in size every hour. Those responsible for network security should be so lucky.

In the face of huge and diverse stores of data, many enterprises are turning to big data analytics to help find threats faster and with more accuracy. Threat detection methods based solely on known elements, such as whitelists and blacklists, signature lists, and rule lists, aren't effective against the unknown. However, searching through vast amounts of data can unearth clues that make anomaly detection techniques more effective in spotting malicious activity, while behavioral analytics can better distinguish between legitimate and suspicious users. Gartner predicts that by 2016 more than 25% of global firms will adopt big data analytics for security and fraud detection.

In this report, we discuss tools and methods for harnessing all available security information and for building a forensic analysis process that can lead to faster identification of targeted attacks and to better strategies for enterprise data defense.