News

01:31 PM
Connect Directly
RSS
E-Mail
50%
50%

6 Skills For Aspiring CIOs | Anonymous Vs. Security Spending

InformationWeek Daily
InformationWeek Daily  

Join the community
Facebook Twitter LinkedIn

  Monday, April 23, 2012

News

  |   Commentary

  |   Slideshows

  |   Reports

  |   Videos

  |   Events

  |   RSS Feeds

 

MUST READ
Between The Lines Columnist Anonymous Drives Security Fears, But Not Spending
By Mathew J. Schwartz
Information security budgets remain focused on stopping malware and advanced persistent threats (APTs), which tend to do more damage in the long run than hacktivists' SQL injection and DDoS attacks.

RELATED
Federal IT Survey: Hacktivists, Cybercriminals Are Top Threats
Who Is Anonymous: 10 Key Facts

Lawmakers Slam USAID Outsourcing Training Program
Congressmen say U.S.-funded initiative to train call center workers in the Philippines puts American jobs at risk.

Infor Socializes, Localizes Its Enterprise Apps
Infor blends social-networking and a cloud-based tax and regulatory approach with its down-to-business ERP systems.

Google Continues Product Purge
Google shutters Patent Search, Flu Vaccine Finder, and Google Related in ongoing trimming of services.

Samsung Preps New Phone, Tablet, Cloud Service
Samsung will show off a new Galaxy smartphone May 3, but rumors also point to a new Galaxy tablet and cloud-based storage service.

Gmail Analytics: Gain Insights, Improve Your Productivity
It's not quite big data, but even a modest amount of data about the way you use Gmail has the potential to make you more productive.

Bazaarvoice Adds SAP, Salesforce.com Integration
Social comments, ratings, and reviews tool will provide real-time feeds for service and support.

QUOTE OF THE DAY
You must lose everything in order to gain anything. -- Brad Pitt

ALSO SEE

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">Gmail Analytics: Gain Insights, Improve Your Productivity
Bazaarvoice Adds SAP, Salesforce.com Integration
recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;"> Strategy: Development Labs in the Cloud
recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;"> Seven Steps for Building Security in the Cloud from the Ground Up
recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;"> 10 Essential Android Apps For SMBs
Prepare Your Infrastructure For The Cloud Using Open Standards
It's Coming: Interop Las Vegas

Download our iPad App

Valley View
Check out our lineup for the Next Valley View (our live Web TV show) TOMORROW, 4 pm PT in our SF HQ:
• Zynga CTO Allan Leinwand
• Hands-on technology demonstrations from SuccessFactors, DataSift, and Proton Media
• A unique look at the latest from ARM at the Valley View Whiteboard
• Prize giveaways and much more!

Register to win prizes and watch the show live; or if you're in the area Contact us to be part of the live audience


  Digital Issue  
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S DIGITAL ISSUE
Hacktivist and cybercriminal threats concern IT teams most, our first Federal Government Cybersecurity Survey reveals. Here's how they're fighting back.

Also: Why federal efforts to cut IT costs don't go far enough, and how the State Department is enhancing security.


DOWNLOAD NOW FREE (Registration Required)

 

 
REPORTS & WHITEPAPERS

FEATURED REPORTS

Strategy: Development Labs in the Cloud

The options available for putting a lab in the cloud are increasing. We take a look at the costs, complexities and challenges involved in making a move to either a public or private cloud lab, and help you figure out how to get there.

Download Now (Registration Required)

Featured Report

Informed CIO: Is Your IT Infrastructure Ready for Mobility?

No one likes to think about a large meeting with multiple mobile devices bringing a WLAN to its knees, but we've seen it happen. Here's how to help your wired and wireless networks seamlessly support mobile and/or remote users--and not buckle under pressure.

Download Now (Registration Required)

Featured Report

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;"> MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Seven Steps for Building Security in the Cloud from the Ground Up
If you are considering a leap to the cloud, you are no doubt figuring out how to extend security to the new environment. Despite potential savings, security is still the number one barrier. Download this white paper to review seven steps to help you build security into your cloud applications. recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
Download Now (Registration Required)

Forrester Report: Killing Data for Security and Risk Professionals
As cybercriminals have become more sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. Read this white paper to learn how to encrypt data, and make cybercriminals look for less robustly protected targets. recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;">
Download Now (Registration Required)

recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;"> MORE WHITEPAPERS

 
MOST POPULAR NEWS
10 Essential Android Apps For SMBs
No glitz, no glamour, just results: These 10 budget-friendly Android apps help SMB users simplify everyday tasks and power through to-do lists.

TSA Tests Identity Verification System
In wake of invalid boarding pass scares, Transportation Security Agency seeks to automate the process of authenticating travel documents and matching them to IDs.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

iPhone 5 May Get New Display, 'Liquidmetal'
Reports that surfaced this week suggest the next iPhone will use brand-new touch screen technology and will be encased in something called "liquidmetal."

Oracle Vs. Google: Tour The Evidence
Oracle and Google continue to fight a nasty courtroom battle over patent and copyright claims involving Java and mobile phones. Consider some of the crucial evidence introduced so far.


 


SLIDESHOWS

Oracle Vs. Google: Tour The Evidence
Oracle and Google continue to fight a nasty courtroom battle over patent and copyright claims involving Java and mobile phones. Consider some of the crucial evidence introduced so far.   View Now

ALSO SEE
Get Social: 11 Management Systems That Can Help
2012 IT Salary Survey: 12 Career Insights

MORE SLIDESHOWS
spacer spacer spacer
VIDEOS

Client-Side Storage with Pamela Fox
Pamela Fox, founder of EatDifferent, discusses Client-Side Storage and how new APIs let you make use of powerful clients to improve both performance and user experience.   Watch

ALSO WATCH
U3-X: Move Over Segway
India-CIR--PyramidPreview

MORE VIDEOS
spacer

 

WEBCASTS

Prepare Your Infrastructure For The Cloud Using Open Standards
Take part in our Interop Webcast which will look at the new drivers influencing cloud infrastructure. It happens April 18. More Information & Registration

ManageEngine - ENTERPRISE IT MANAGEMENT Software.

 
RESOURCES AND EVENTS

It's Coming: Interop Las Vegas
See the future of business technology at Interop Las Vegas, May 6-10. It's the best place to learn how cloud computing, mobile, video, virtualization, and other key technologies work together to drive business. Register today with priority code CPQCNL07 to get a free Expo Pass or to save 25% on Flex and Conference passes.
Don't Miss It -- Register Today!



This e-mail was sent to EmailAddress

InformationWeek Daily

-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.



Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:

email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Comment  | 
Print  | 
More Insights
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed