News

01:02 PM
Connect Directly
RSS
E-Mail
50%
50%

4 Steps For Proactive Cybersecurity | Apple: IT's Arch Frenemy

InformationWeek Daily
InformationWeek Daily  

Join the community
Facebook Twitter LinkedIn

  Tuesday, January 22, 2013

News

  |   Commentary

  |   Slideshows

  |   Reports

  |   Videos

  |   Events

  |   RSS Feeds

 

MUST READ
Between The Lines Columnist Why Apple Is IT's Arch Frenemy
By Richard Hoffman

Apple devices are supported in nine out of 10 companies, our research finds, but IT needs ways to manage them more efficiently and securely.

RELATED
Close The BYOD Security Hole
Apple Doesn't Rule The School

4 Steps For Proactive Cybersecurity
Tired of having malware punch you in the face? The time's not right to hit back, but here are moves to make now.

Offensive Cybersecurity: Theory And Reality
Can you -- and should you -- strike back at attackers? It's a complex question with ethical, legal, technical and practical considerations.

3 Tips For Getting Started With Big Data
Don't dive in head first, says Fed-focused data analytics and cloud provider.

Jive To Add Business Value To Social Platform
Jive's spring update will add a host of new features to help enterprises use social tools to further business agenda.

Cisco Futurists Plan For Internet Of Everything
Cisco foresees connected devices, pervasive sensing and big data will drive need for data scientists to bring order to information overload.

Oracle Offers Subscription Pricing For On-Premises IaaS
Oracle will configure and charge monthly for familiar infrastructure-as-a-service appliances, rather than requiring a large upfront purchase.

Is Facebook Making You Fat?
Research connects social media-induced self-esteem boosts to self-control. Consider these implications for business.

CIOs Clueless About Social? Maybe Not
One survey does not prove CIOs underestimate the importance of social business. There might be other reasons social ranks low on CIO to-do lists.

We Must Run Government IT Like A Startup
Government 2.0 is about more than social media. It requires throwing out outdated processes and adopting new models of success.

QUOTE OF THE DAY
"If everyone is thinking alike, then no one is thinking." -- Benjamin Franklin

ALSO SEE

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">CIOs Clueless About Social? Maybe Not
We Must Run Government IT Like A Startup
recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;"> Informed CIO: Cloud Standards
recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;"> The Business of Social Business
10 Best Android Apps Of 2012
Is Your Network Ready for BYOD?
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

JOIN THE CONVERSATION
Posted By lbell284:
"Oracle is going to lose again. They should really quit wasting their money on this one paying lawyers as the lawyers are the only one's getting anything out of it now."
In reply to: "Oracle Appeals Android Lawsuit"
View Entire Response | Post Your Own Reply

Posted By Mike_Acker:
"In my experience most troubles with IT originate from IT marketing. IT is generally over-sold . IT is just a tool . like any tool we have to learn to use it to our best advantage"
In reply to: 5 Ways Business Still Fails The IT Organization
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S LATEST DIGITAL ISSUE
Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead.

Also in our new, all-digital issue: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war.


DOWNLOAD NOW FREE (Registration Required)

 

 
REPORTS & WHITEPAPERS

FEATURED REPORTS

Informed CIO: Cloud Standards

IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what's interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.

Download Now (Registration Required)

Featured Report

Alert: Java Insecurity

In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

Download Now (Registration Required)

Featured Report

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;"> MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
The Business of Social Business
A new IBM Institute for Business Value study reveals how organizations can use social approaches to create meaningful business value. recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
Download Now (Registration Required)

9 Steps to Building a Business Case for B2B Integration
In today's struggling economy, we all know that it's crucial to establish a strategic plan when implementing a business case -- from appealing to each decision-maker to making sure that the case meets basic financial requirements. Learn how to build and justify a business case, in nine steps. recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
Download Now (Registration Required)

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;"> MORE WHITEPAPERS

 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

5-Inch Smartphone Displays To Be Standard In 2013
What's in store from handset makers for the remainder of the year? Think full-HD displays.

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

20 Great Ideas To Steal In 2012
Are you playing it too safe, IT leaders? Take these InformationWeek 500 projects along to rev up your next brainstorming session.

12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.

 


SLIDESHOWS

New England Patriots' Winning Technology Plan
IT pros from Boston's professional teams -- the Patriots, Celtics, Bruins and Red Sox -- met at Gillette Stadium to talk tech, the future of live sports, and how to deliver real-time, high-definition video to a crowd of 70,000.   View Now

ALSO SEE
Android Smartphone Developments At CES 2013
10 Social Networks For Special Interests

MORE SLIDESHOWS
spacer spacer spacer
VIDEOS

CES 2013, it's a wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

ALSO WATCH
CES; the car show
Intel shows off eye tracking and gesture tech

MORE VIDEOS
spacer

 

WEBCASTS

Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration

 
RESOURCES AND EVENTS

2013 InformationWeek 500: Nominations Now Accepted
Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12



This e-mail was sent to EmailAddress

InformationWeek Daily

-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.



Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:

email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


Comment  | 
Print  | 
More Insights
Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed