Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

4 Steps For Proactive Cybersecurity | Apple: IT's Arch Frenemy

InformationWeek Daily
InformationWeek Daily  

Join the community
Facebook Twitter LinkedIn

 
Tuesday, January 22, 2013

News

  |  
Commentary

  |  
Slideshows

  |  
Reports

  |  
Videos

  |  
Events

  |  
RSS Feeds

 


MUST READ


Between The Lines Columnist
Why Apple Is IT's Arch Frenemy



By Richard Hoffman


Apple devices are supported in nine out of 10 companies, our research finds, but IT needs ways to manage them more efficiently and securely.


RELATED

Close The BYOD Security Hole
Apple Doesn't Rule The School



4 Steps For Proactive Cybersecurity




Tired of having malware punch you in the face? The time's not right to hit back, but here are moves to make now.


Offensive Cybersecurity: Theory And Reality



Can you -- and should you -- strike back at attackers? It's a complex question with ethical, legal, technical and practical considerations.



3 Tips For Getting Started With Big Data




Don't dive in head first, says Fed-focused data analytics and cloud provider.



Jive To Add Business Value To Social Platform




Jive's spring update will add a host of new features to help enterprises use social tools to further business agenda.



Cisco Futurists Plan For Internet Of Everything




Cisco foresees connected devices, pervasive sensing and big data will drive need for data scientists to bring order to information overload.



Oracle Offers Subscription Pricing For On-Premises IaaS




Oracle will configure and charge monthly for familiar infrastructure-as-a-service appliances, rather than requiring a large upfront purchase.



Is Facebook Making You Fat?




Research connects social media-induced self-esteem boosts to self-control. Consider these implications for business.



CIOs Clueless About Social? Maybe Not




One survey does not prove CIOs underestimate the importance of social business. There might be other reasons social ranks low on CIO to-do lists.



We Must Run Government IT Like A Startup




Government 2.0 is about more than social media. It requires throwing out outdated processes and adopting new models of success.


QUOTE OF THE DAY

"If everyone is thinking alike, then no one is thinking." -- Benjamin Franklin


ALSO SEE

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">CIOs Clueless About Social? Maybe Not
We Must Run Government IT Like A Startup

recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">
Informed CIO: Cloud Standards

recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">
The Business of Social Business


10 Best Android Apps Of 2012


Is Your Network Ready for BYOD?


2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App


JOIN THE CONVERSATION


Posted By lbell284:

"Oracle is going to lose again. They should really quit wasting their money on this one paying lawyers as the lawyers are the only one's getting anything out of it now."


In reply to:

"Oracle Appeals Android Lawsuit"

View Entire Response | Post Your Own Reply


Posted By Mike_Acker:

"In my experience most troubles with IT originate from IT marketing. IT is generally over-sold . IT is just a tool . like any tool we have to learn to use it to our best advantage"



In reply to:

5 Ways Business Still Fails The IT Organization

View Entire Response | Post Your Own Reply

  Digital Issue  


DOWNLOAD INFORMATIONWEEK GOVERNMENT'S LATEST DIGITAL ISSUE


Offensive cybersecurity is a tempting prospect. It's also way too early to go there.
Here's what to do instead.

Also in our new, all-digital issue: Military
agencies worldwide are figuring out the tactics and capabilities that will be critical in
any future cyber war.



DOWNLOAD NOW FREE (Registration Required)

 


Click here

 

REPORTS & WHITEPAPERS

FEATURED REPORTS

Informed CIO: Cloud Standards


IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what's interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.


Download Now (Registration Required)


Featured Report

Alert: Java Insecurity


In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?


Download Now (Registration Required)

Featured Report

recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
MORE REPORTS

spacer spacer spacer

FEATURED WHITEPAPERS



The Business of Social Business



A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value.

recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
Download Now (Registration Required)



9 Steps to Building a Business Case for B2B Integration



In today's struggling economy, we all know that it's crucial to establish a strategic plan when implementing a business case -- from appealing to each decision-maker to making sure that the case meets basic financial requirements. Learn how to build and justify a business case, in nine steps.

recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
Download Now (Registration Required)

recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
MORE WHITEPAPERS
 

MOST POPULAR NEWS


10 Best Android Apps Of 2012



Check out these 10 gems that stood out from the crowd of 700,000 Android apps.



5-Inch Smartphone Displays To Be Standard In 2013



What's in store from handset makers for the remainder of the year? Think full-HD displays.



Big Data Analytics Masters Degrees: 20 Top Programs



These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.



20 Great Ideas To Steal In 2012



Are you playing it too safe, IT leaders? Take these InformationWeek 500 projects along to rev up your next brainstorming session.



12 Best iPhone, iPad Apps Of 2012



You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.

 



SLIDESHOWS



New England Patriots' Winning Technology Plan



IT pros from Boston's professional teams -- the Patriots, Celtics, Bruins and Red Sox -- met at Gillette Stadium to talk tech, the future of live sports, and how to deliver real-time, high-definition video to a crowd of 70,000.
 

View Now



ALSO SEE




Android Smartphone Developments At CES 2013






10 Social Networks For Special Interests



MORE SLIDESHOWS


spacer spacer spacer

VIDEOS


CES 2013, it's a wrap!



While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.
 

Watch


ALSO WATCH



CES; the car show






Intel shows off eye tracking and gesture tech


MORE VIDEOS


spacer

 


WEBCASTS


Is Your Network Ready for BYOD?



Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy.



More Information & Registration


 


RESOURCES AND EVENTS

2013 InformationWeek 500: Nominations Now Accepted



Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.


Deadline is April 12


This e-mail was sent to EmailAddress

InformationWeek Daily

-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a
moment to add the newsletter's address to your anti-spam white list:

[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our
Privacy Statement.