• Weird Emails Sent to Essential Customers: Scam or Fail?

    Weird Emails Sent to Essential Customers: Scam or Fail?

    Update (8/31): Essential Founder and CEO Andy Rubin late Thursday said the emails were the result of a "misconfigured account.Original Story (8/30):Essential may have just accidentally phished its own customers.
  • Find the Digital Skills Your Company Needs to Succeed

    Find the Digital Skills Your Company Needs to Succeed

    Beyond pure technology jobs, business functions such as HR, marketing and finance can benefit from the contributions made by digitally skilled team members, Gretczko says.Being "digital" changes companies in a number of positive ways, Gretczko says.
  • Sony Xperia XZ1 Compact

    Sony Xperia XZ1 Compact

    The Xperia XZ1 Compact ($599.The XZ1 Compact isn't striking at first glance: It looks like just another little plastic-bodied Sony design (although it isn't plastic per se, but a sort of glass-infused polymer) with a 4.
  • New Camera Modules Make Fairphone 2 Worth a Second Look

    New Camera Modules Make Fairphone 2 Worth a Second Look

    Last year, we went hands on with the Fairphone 2, and were impressed by the ability to disassemble and swap out everything from the display to the camera.It makes the Fairphone 2 the first smartphone to offer a core function upgrade rather than simple customization.
  • Protect Your Data the Way Banks Protect Your Money | Tech Library

    Protect Your Data the Way Banks Protect Your Money | Tech Library

    Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network.Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress.
  • Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership | Tech Library

    Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership | Tech Library

    Uncovering the hidden costs and benefits of your PAM implementation approachPrivileged user accounts - whether usurped, abused or simply misused - are at the heart of most data breaches.Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake.
  • Sponsored Videos - Latest Content

    Sponsored Videos - Latest Content

    Going Beyond Checkbox Security InformationWeek Sponsored Videos  |  Post a comment Terry Barbounis, cybersecurity evangelist for CenturyLink, stops by the InformationWeek News Desk.Threat Lifecycle Management InformationWeek Sponsored Videos  |  Post a comment Principal Sales Engineer for LogRhythm Chris Martin stops by the InformationWeek News Desk.
  • The Unstoppable Progression of Object Storage

    The Unstoppable Progression of Object Storage

    In recent years, features have been added to make object storage more than just a single protocol solution.In fact, object storage offerings are now capable of serving as the storage platform for vast data center workloads across different protocols and workloads.
  • Infographic: 2017 State of the Cloud

    Infographic: 2017 State of the Cloud

    Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve you Is private cloud on its way out and is hybrid cloud practical?This infographic provides a snapshot of key data points from our 2017 State of the Cloud report.
  • Interop ITX 2017 State Of DevOps Report | Tech Library

    Interop ITX 2017 State Of DevOps Report | Tech Library

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly.But embracing DevOps means making significant cultural, organizational, and technological changes.
  • Fannie Mae Turns to DevOps for Speed and Efficiency

    Fannie Mae Turns to DevOps for Speed and Efficiency

    According to Gregg Davis, Fannie Mae's quality management manager, the program announcement inspired thousands of improvement suggestions.Project work began with transitioning existing development tools into a DevOps pipeline, Davis says.
  • Avoid the Danger Zone of Metrics

    Avoid the Danger Zone of Metrics

    When metrics aren’t focused on the right thing, aligned across teams, or are gamed, their value decreases.Proxy metrics can lead to vanity metrics.
  • Change and Community in Analytics

    Change and Community in Analytics

    To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats.Download the report to see what they're saying.
  • Job Loss And Financial Damage: CIOs' Main Fears When Adopting Virtualization

    Job Loss And Financial Damage: CIOs' Main Fears When Adopting Virtualization

    Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve you Companies aren't prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.Some 73% of IT decision makers fear their companies might have to pay financial compensation in the event of a security breach, while 66% even fear losing their jobs.
  • Digital Transformation: 5 Strategies for Success

    Digital Transformation: 5 Strategies for Success

    These days, digital transformation is on the agenda for many companies, and nonprofits are no exception.So we're transforming how we operate internally and then how we offer that technology out as well.
  • Why I Gave My Engineering Team a Chance for a Do-Over

    Why I Gave My Engineering Team a Chance for a Do-Over

    A microservices architecture offers greater global accessibility and enhanced functionality for customers.Our own infrastructure engineering team learned to scale from solving individual problems to building tools that enabled different microservice teams to solve problems.
  • The Importance of the Partner Ecosystem in Your Storage Solution

    The Importance of the Partner Ecosystem in Your Storage Solution

    This open ecosystem includes a variety of communities, each of which contributes significantly to the core solution.) and application software vendors needed to “round out” the solution.
  • Network Monitoring for Every User Community

    Network Monitoring for Every User Community

    To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats.Download the report to see what they're saying.
  • DevOps Can't Happen Without Education

    DevOps Can't Happen Without Education

    But before you jump into the execution of DevOps, it's important to understand the dynamics behind it.So moving toward DevOps means companies must think about how they educate their staff, and IT pros must look for ways to ramp up in areas that were once far beyond their scope.
  • Cloud Vendor Lock-In a Risk Worth Taking

    Cloud Vendor Lock-In a Risk Worth Taking

    Fears of vendor lock-in should not get in the way of cloud deployments, especially when it comes to platforms such as Amazon Web Services and Microsoft Azure.On the other hand, Bartels said companies must carefully evaluate relationships with CRM providers such as Salesforce and Oracle.