security and risk strategy - InformationWeek
IoT
IoT
IT Leadership // Security & Risk Strategy
News & Commentary
Make Cybersecurity About Innovation and Growth
Guest Commentary, Guest Commentary
Commentary
Cybersecurity doesn’t have to be just a cost of doing business. With the right approach, it can both protect while creating new levels of business growth.
By Jim Poole, Vice President for Global Ecosystem Development, Equinix , 11/16/2017
Comment0 comments  |  Read  |  Post a Comment
Tech Vendors to Watch in 2018
Susan Fogarty, Editor in Chief
Satire
Browse through the hottest vendors in cloud, DevOps, infrastructure, security, and data and analytics.
By Susan Fogarty Editor in Chief, 11/14/2017
Comment0 comments  |  Read  |  Post a Comment
Are DevOps and Software Quality Incompatible?
Guest Commentary, Guest Commentary
Commentary
The DevOps concept's focus on speed to market and continuous release can leave gaps in software quality. Understand which ones you can live with, and which are critical.
By Mary Shacklett, founder and owner of Transworld Data , 11/9/2017
Comment0 comments  |  Read  |  Post a Comment
How to Hire Diverse Talent in Security
Emily Johnson, Digital Content Editor, InformationWeek
SatireVideo
Juliet Okafor, VP of business development at Fortress Information Security, shared why she thinks the security talent shortage is a myth.
By Emily Johnson Digital Content Editor, InformationWeek, 11/8/2017
Comment0 comments  |  Read  |  Post a Comment
The Cloud: We're Not in 2012 Any More
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
News
Forrester's upcoming cloud 2018 predictions report, scheduled for release tomorrow, highlights just how dramatic developments in security, analytics, and applications tools have advanced the cloud.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 11/6/2017
Comment0 comments  |  Read  |  Post a Comment
Embrace the Cyber Security-Physical Security Nexus
Guest Commentary, Guest Commentary
Commentary
It's time for the IT security team and the physical security team to work together on a "cyber-physical" security strategy.
By Nitin Natarajan, Principal, Cadmus , 11/6/2017
Comment0 comments  |  Read  |  Post a Comment
Securing Travel and Trade with Blockchain
Guest Commentary, Guest Commentary
Commentary
Among the growing number of potential applications for blockchain is border management and security.
By James Canham, managing director, Accenture Border Services , 10/27/2017
Comment0 comments  |  Read  |  Post a Comment
Quantum Computing Brings Promise and Threats
Lisa Morgan, Freelance Writer
News
Faster, better, potentially dangerous. Quantum computers will push way past the boundaries of traditional computers, but to what ends? We explore some of the possibilities.
By Lisa Morgan Freelance Writer, 10/26/2017
Comment2 comments  |  Read  |  Post a Comment
Amazon Key: Just a Few Key Concerns
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
The introduction of Amazon Key as an in-home delivery service stretches trust just a bit too far.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/26/2017
Comment0 comments  |  Read  |  Post a Comment
Staying Relevant and Successful in the Best and Worst Climates
Guest Commentary, Guest Commentary
Commentary
A look back at a quarter century’s worth of experiences that companies of all sizes can learn from
By Gary Smith, CEO, Ciena , 10/25/2017
Comment0 comments  |  Read  |  Post a Comment
Management Tools Bring Structure to Multi-Cloud Environments
John Edwards, Technology Journalist & Author
Satire
New tools help enterprises organize and maximize their expanding multiple cloud infrastructure.
By John Edwards Technology Journalist & Author, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
15 Highest-Paying Tech Jobs for 2018
Cynthia Harvey, Contributor, NetworkComputing
News
Executives, managers, mobile developers and people with the word "architect" in their title are at the top of the IT pay scale.
By Cynthia Harvey Contributor, NetworkComputing, 10/17/2017
Comment1 Comment  |  Read  |  Post a Comment
10 Steps Enterprises Need to Take to Comply with GDPR
Cynthia Harvey, Contributor, NetworkComputing
News
If your organization doesn’t have adequate data protection measures in place, including assigning a data protection officer, you could face steep fines next May.
By Cynthia Harvey Contributor, NetworkComputing, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
AIM Was a Pioneer in Collaboration
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
News
Now 20 years old, AOL Instant Messenger is quietly heading to software's trash heap.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/10/2017
Comment2 comments  |  Read  |  Post a Comment
How to Maintain Security when Rolling out DevOps
Guest Commentary, Guest Commentary
Commentary
DevOps may be up and running for your enterprise. Taking the time to integrate security will keep it that way.
By Kiran Chitturi, CTO Architect, Sungard Availability Services , 10/5/2017
Comment0 comments  |  Read  |  Post a Comment
Cyberthreats: Stay Ahead of Them with a Proactive Strategy
Guest Commentary, Guest Commentary
Commentary
To mitigate the risks presented by more aggressive cyberthreats, organizations need to get out in front of those threats.
By Karin Ratchinsky, director of healthcare strategy, Level 3 , 10/4/2017
Comment0 comments  |  Read  |  Post a Comment
One More Reason to Care about the Equifax Data Breach
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief
Commentary
The Equifax data breach should open our eyes to the issue of explicit consent, a concept our peers in Europe are dealing with now.
By James M. Connolly Executive Managing Editor, InformationWeekEditor in Chief, 10/4/2017
Comment0 comments  |  Read  |  Post a Comment
Moving the Cloud Closer to the Business
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
We will soon reach the point where connectivity to cloud resources is going to become a serious issue in terms of real-time computing functions. So, how do we bring the cloud closer to us?
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 10/2/2017
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Should Be Chess, Not Checkers
Guest Commentary, Guest Commentary
Commentary
Cybersecurity initiatives for government agencies -- in fact, other organizations, too -- have to be proactive and iterative.
By Will Ash, Senior Director of Security, U.S. Public Sector, Cisco , 9/29/2017
Comment0 comments  |  Read  |  Post a Comment
It's a New, Challenging World for Data Governance
John Edwards, Technology Journalist & Author
Commentary
Data governance strategy is rapidly shifting from the defense to the offense.
By John Edwards Technology Journalist & Author, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.