Stories by InfoWorld staff

Download the Insider Threat Deep Dive Report

Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.

Download the Cloud Applications Deep Dive report

Thanks to the success of Amazon EC2, Salesforce, and other public cloud services, most enterprises understand the value of cloud computing, and an increasing number of enterprises are exploring the idea of getting into the cloud computing business. Why not? Launching a public cloud service may establish a new revenue stream -- or self-service convenience for customers -- with minimal additions to existing infrastructure.

Special report: InfoWorld's developers survival guide

Change never lets up in technology, and the best developers must stay atop all the latest shifts, from big data to cloud computing to consumerization and beyond. InfoWorld's experts offer guidance to programmers on trends to watch, best practices to adopt, and sins to drop. They also point out programming languages on the rise, the best areas to find tech jobs, and the business skills to master.

InfoWorld seeks nominees for top tech leaders

These days, successful technology leadership means creatively and innovatively using technology to make a real business impact, whether in the private, government, education, or nonprofit sector. To honor the leaders behind such innovation, InfoWorld.com, the premier website for IT and business professionals seeking to stay abreast of leading technology trends and issues, seeks entries for its annual Technology Leadership Awards.

The essential strategy guide on the consumerization of IT

There may be someone in a dark corner of IT who hasn't heard about the consumerization of IT, that growing trend toward active user involvement and even control over aspects of the business's technology portfolio. By now, most of IT is aware -- sometimes painfully so. Also quite aware are business execs, who increasingly wave away IT's securty and control concerns as their users and customers swoon over iPads, social networking, cloud services, and the rest of the consumerization repertoire. They see employees who can do more in more places, and often they're discovering the joys personally.

Cloud computing in 2012: An InfoWorld special report

InfoWorld gives you the full scoop on the state of the cloud in 2012, including key trends in the cloud's technology and its job opportunities, as well as what you have to know about the cloud before developing for it.

Download InfoWorld's Malware Deep Dive report

If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, more than 25 million unique malware programs were identified, more than all the malware programs ever created in all previous years. No one need wonder what all that malware is trying to do: It's trying to steal money -- through data theft, bank transfers, stolen passwords, or swiped identities.

Stupid user tricks 6: IT idiocy loves company

You'd think we'd run out of them, but technology simply hasn't advanced enough to take <a href="http://www.infoworld.com/t/it-jobs/t1-vs-t10-playing-the-numbers-game-marketing-168279">boneheaded users</a> out of the daily equation that is the IT admin's life.

[]