What's New in IT Security?
With new security threats continuously emerging, what can organizations do to harden their security and to better protect themselves from network intrusions and avoid damage?
Big Data in the Cloud: Avoiding Vendor Lock-in
More enterprise application and big data vendors are pursuing a cloud-agnostic strategy -- supporting AWS, Microsoft Azure, and Google Cloud. Big data platform provider Hortonworks is taking that strategy one step farther.
IBM Bets On Private Cloud Data Platform
Assembling the pieces to create a modern platform for data management, data governance, and data science can be complex. IBM says it's done the heavy lifting with a private, on-premises cloud platform to do the work.
How Valuable Is Your Company's Data?
Organizations consider data one of their most valuable assets, but exactly, how much is that data worth? Most business leaders can't answer the question yet. But venture capitalists, financial analysts and board members increasingly want to know.
AI Works Better with Human Intelligence, Too
In healthcare, machine learning may yield fast, accurate insights. But humans are still better able to detect ridiculous anomalies and discover problems that machines have not yet learned to detect.
How to Avoid Big Data Mistakes
If data is important to your company, then creating a data governance program is as essential to the business as an accounting program.
Healthcare's Looming Disruption: How Can IT Prepare?
A new Gartner Maverick report says that annual physical medical exams and primary care doctors are about to be disrupted by IoT medical devices and algorithm. Here's how IT must shift to accommodate the change.
Top 125 Vendors To Watch
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
10 IoT Security Best Practices For IT Pros
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
Google's Cloud Lets You Bring Your Own Encryption Keys
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
HPE Reportedly Considers Going Private
Has HPE put itself or its software business up for sale? Multiple reports note that a group of private equity companies are interested in buying the software business, or taking the entire company private. What would either deal mean for IT?
Using AI To Fight Cyberthreats
SparkCognition, working with Carnegie Mellon and IBM's Watson, aims to provide cyber-security researchers with better threat data using predictive models powered by machine learning.
Lawsuit Raises Questions About The Right To Tinker With Tech
The Electronic Frontier Foundation has filed a lawsuit to overturn a provision in the Digital Millennium Copyright Act which limits the modification of technology. For anyone managing information technology, the law in question has the potential to limit access to data, to weaken security, and to impose unnecessary burdens, costs, and liabilities.
IBM's Cloud, Analytics Investments Start Paying Off
IBM's second quarter total revenues and earnings per share declined again, but executives and analysts put their focus on the company's strategic initiatives, which showed continued growth in the most recent quarter.
Can Big Data Help Cure Cancer?
Genomic research and precision medicine are on the leading edge of cancer research and treatment, but the huge size of the data sets and the complexity of sharing those data sets among researchers thwarts progress. Here's one project that is aiming to remove those obstacles.
10 Hot SaaS Security Startups To Watch
Leveraging cloud-based security services is helping to solve some major stumbling blocks when it comes to providing a robust architecture for organizations. To help you navigate your options, we're spotlighting 10 SaaS security startups whose tools are worth a look.
Beyond BlackBerry: Outdated Tech The Feds Should Dump
The US Senate is finally ditching BlackBerry devices. Now, if only the rest of the government could leave the past behind. Here's a look at outdated tech still being used by federal agencies, including the military and the IRS.
8 Reasons You Need A Security Penetration Test
One of the biggest challenges in IT security is determining whether the tools and configurations you have in place are giving your organization the level of security you require. Here's how penetration testing can help.
Security Threats Hiding In Plain Sight
IT professionals would rather manage external threats than worry about insiders, a recent survey by Soha finds. But singular focus when it comes to security can end up being a costly mistake.
Symbolic IO Rewrites Rules For Storage
The company's IRIS system promises dramatic speed improvements over existing technologies. These storage improvements should benefit anyone running large database queries, particularly transactions that require speed.