security and risk strategy - InformationWeek
IoT
IoT
IT Leadership // Security & Risk Strategy
News & Commentary
Does Your Breach Incident Response Plan Have Holes?
Guest Commentary, Guest Commentary
Commentary
The likelihood of a company suffering a breach is worse than most believe. Here's a checklist for building out a plan to deal with a breach.
By Xuyen Bowles, Sentek Cyber , 8/16/2017
Comment0 comments  |  Read  |  Post a Comment
Innovation Relies on Humanizing the IT Organization
Guest Commentary, Guest Commentary
Commentary
IT organizations are quick to talk about hardware failures, software failures, and outages, but so often the cause of IT failures can be pinned on people.
By Brian Amaro, Senior Solutions Architect, ScienceLogic , 8/11/2017
Comment0 comments  |  Read  |  Post a Comment
Financial Institutions Bank on Change to Stay Competitive
John Edwards, Technology Journalist & Author
News
Corporate transformation seen as the best way to counter digital disruption and address other key challenges.
By John Edwards Technology Journalist & Author, 8/4/2017
Comment0 comments  |  Read  |  Post a Comment
Peer Advice: 7 Steps Toward Change
John Edwards, Technology Journalist & Author
News
Tips for financial institutions or others heading for digital transformation.
By John Edwards Technology Journalist & Author, 8/4/2017
Comment0 comments  |  Read  |  Post a Comment
Think AI, Clouds, Football, and Structure
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
One of the challenges to innovation and adoption of emerging technologies is our reliance on classifying everything and everyone.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 8/3/2017
Comment1 Comment  |  Read  |  Post a Comment
Why Businesses Need to Update Their DR Plan Now
Guest Commentary, Guest Commentary
Commentary
With cyberattacks becoming more common, and natural and man-made disasters not going away, disaster recovery programs are more important than ever.
By Kevin Beasley, CIO at VAI , 8/1/2017
Comment0 comments  |  Read  |  Post a Comment
MillerCoors’ $100-Million IT Lawsuit Warning
Patrick Thibodeau, Freelance Reporter
News
There are lessons to be learned by CIOs planning outsourcing projects in the dueling lawsuits involving MillerCoors and HCL.
By Patrick Thibodeau Freelance Reporter, 7/27/2017
Comment3 comments  |  Read  |  Post a Comment
What Analytics Pros Need to Know about GDPR
Jen Underwood, Impact Analytix
Commentary
Understanding the EU's GDPR guidelines is valuable knowledge for anyone in a data related profession.
By Jen Underwood Impact Analytix, 7/26/2017
Comment0 comments  |  Read  |  Post a Comment
Data Drift Happens: 7 Pesky Problems with People Data
Guest Commentary, Guest Commentary
Commentary
Making sense of data associated with customers, citizens and other individuals may seem simple, but it’s possible that the records don’t tell the real story.
By Matthew Magne, SAS , 7/19/2017
Comment0 comments  |  Read  |  Post a Comment
Dark Reading INsecurity Conference Registration Now Open
Tim Wilson, Editor in Chief, Dark Reading,
Commentary
November event will focus on attendee interaction, "blue team" best practices.
By Tim Wilson, Editor in Chief, Dark Reading , 7/19/2017
Comment0 comments  |  Read  |  Post a Comment
Consumers Welcome AI, Despite Lingering Privacy Concerns
Guest Commentary, Guest Commentary
Commentary
Potential societal benefits of artificial intelligence outweigh concerns, although people want some transparency.
By Jocelyn Aqua, Privacy and Cybersecurity Principal, PwC , 7/19/2017
Comment0 comments  |  Read  |  Post a Comment
Three Big Data Developments No One is Talking About
Guest Commentary, Guest Commentary
Commentary
What you will be discussing about big data in a year will be very different from today's conversations.
By Nick Elprin and Philip Levinson , 7/18/2017
Comment0 comments  |  Read  |  Post a Comment
Unlocking Speed and Efficiency with Compliance as Code
Nathen Harvey, Vice President of Community Development, Chef
Satire
A key element of DevOps is the ability to build security and compliance into the application process -- continuous compliance.
By Nathen Harvey Vice President of Community Development, Chef, 7/13/2017
Comment0 comments  |  Read  |  Post a Comment
10 IT Jobs That Will Be Done by AI
Cynthia Harvey, Contributor, NetworkComputing
News
Artificial intelligence is already taking on some tasks that were previously performed by humans — but that doesn’t necessarily mean you will soon be out of job.
By Cynthia Harvey Contributor, NetworkComputing, 7/10/2017
Comment3 comments  |  Read  |  Post a Comment
Blockchain Moving Beyond Bitcoin
John Edwards, Technology Journalist & Author
News
Experts expect to see the shared database technology securely managing transactions in areas ranging from real estate to digital.
By John Edwards Technology Journalist & Author, 7/7/2017
Comment1 Comment  |  Read  |  Post a Comment
Greene: Advanced Services to Fuel Google Cloud Leadership
Charles Babcock, Editor at Large, Cloud
News
Google Cloud Chief Diane Greene predicts Google's expanding, advance cloud services will soon place it among the Gartner designated leaders.
By Charles Babcock Editor at Large, Cloud, 7/6/2017
Comment1 Comment  |  Read  |  Post a Comment
Four Things You Need to Know About Cybersecurity
Guest Commentary, Guest Commentary
Commentary
Data about IT attitudes toward customer privacy provides a wake-up call to IT professionals, their companies, and their customers.
By Bill Mann, Chief Product Officer, Centrify , 7/5/2017
Comment0 comments  |  Read  |  Post a Comment
7 Steps to GDPR for US Companies
Guest Commentary, Guest Commentary
Commentary
The EU's GDPR impacts all companies doing business with EU citizens. Here are some important steps to take to ensure you’re on the fast track to compliance.
By Martin James, Regional Vice President, DataStax , 7/4/2017
Comment0 comments  |  Read  |  Post a Comment
How Artificial Intelligence Will Revolutionize Banking
Guest Commentary, Guest Commentary
Commentary
AI has taken some steps into banking, but it also is poised to revolutionize how banks learn from and interact with customers.
By Alan McIntyre, Senior Managing Director of Global Banking, Accenture , 6/26/2017
Comment0 comments  |  Read  |  Post a Comment
FireEye CEO Shares State of IT Threat Landscape
InformationWeek Staff,
SatireVideo
FireEye CEO Kevin Mandia talks about the state of the IT threat landscape and where enterprises should focus their attention when it comes to cybersecurity.
By InformationWeek Staff , 6/23/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.