Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

5 Essential Mobile Security Tips | How StartCom Foiled Comodohacker

InformationWeek Daily
InformationWeek Daily  
  Friday, September 9, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
5 Essential Mobile Security Tips
By Robert Lemos
Consider this expert security advice to lock down your smartphone or tablet--plus protect your related apps and data.

RELATED
Your Car's Next Enemy: Malware
Inside The Booming Botnet Industry

How StartCom Foiled Comodohacker: 4 Lessons
Comodohacker claims to have exploited six certificate authorities including DigiNotar--yet he failed to break into at least one. Here's how StartCom's approach to security worked.

Stanford Hospital Breach Exposes 200,000 ER Records
Spreadsheet uploaded to homework-help website exposed sensitive patient data for almost a year.

VA, DOD Choose Open Source To Combine EHRs
Two federal departments launch open-source community to create a single EHR that combines military and VA records.

Steve Jobs Was A Lawyer's Dream CEO
Apple's former chief taught all executives how to protect innovations, keep secrets, and enforce their companies' rights.

Skytap Brings Self Service To Hybrid Clouds
Automation tools cut the cost of cloud management and federation by upwards of 70%, says vendor.

To Catch An APT
It's not about prosecuting the nameless, faceless attackers behind these relentless targeted attacks--it's about minimizing the damage they incur.

Treat Hackers As Organized Criminals, Says Government
Obama administration seeks tougher penalties for cybercrime, but legal experts warn that current, imprecise proposals could be too widely applied.

Understanding UC In The Cloud
Unified communications isn't like other cloud apps. We outline crucial differences to help you make the best choice.

QUOTE OF THE DAY
To love abundantly is to live abundantly, and to love forever is to live forever. -- Henry Drummond

ALSO SEE

Treat Hackers As Organized Criminals, Says Government
Understanding UC In The Cloud
State Of Storage 2011 Report: Consolidation And Centralization
Accelerate Data Access with Enterprise SSD
100 Years Of IBM: 25 Historic Milestones
Broken State of Backup
Don't Miss Interop New York

JOIN THE CONVERSATION
Posted By 3n1gma:
"The issue is not if the teacher was overly trusting of a student or if she should have been more cautious. The issue is did this company break the law when the performed the trap on the data being sent from one person to another over a medium that they do not own."
In reply to: Laptop Tracking Software Faces New Privacy Heat
View Entire Response | Post Your Own Reply

Posted By ANON1251977588428:
"The idea of Data Center Consolidation is over. Someone should see this total absence of innovation in this idea?. A big waste of money! Kundra didn't see. VanRoekel will see? No!"
In reply to: Federal IT's Revolving-Door Problem
View Entire Response | Post Your Own Reply


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
State Of Storage 2011 Report: Consolidation And Centralization
Download this report to see how smart CIOs will accelerate this trend by adopting new multipurpose arrays and converged networks.
Download Now (Registration Required)
Featured Report

Deduplication To Optimize Disaster Recovery
Designing infrastructure for business continuity and disaster recovery requires a mix of business and technological savvy. Deduplication at the disk and the network level can make it easier to move and store critical information in your DR environment.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Accelerate Data Access with Enterprise SSD
It takes world-class engineering to make enterprise-class solid-state drives. The controller of SSD determines its reliability, availability and serviceability of an SSD. Download this brief to review SSD controller technologies that are engineered from the ground-up for demanding environments with high workloads and continuous duty cycles.
Download Now (Registration Required)

Workload Automation Challenges and Opportunities
Enterprise workload management requirements are changing. Discover how workload automation solutions address emerging requirements.
Download Now (Registration Required)

MORE WHITEPAPERS
 


MOST POPULAR NEWS
100 Years Of IBM: 25 Historic Milestones
IBM this week celebrates 100 years of innovation and business optimization. From punch cards to the S/360, from tabulators to teraflops, from CEO Watson to supercomputer Watson, IBM has a unique history. Take a visual tour back through the decades.

iPhone 5 Production Ramps Up At Foxconn
Apple supplier cranks out 150,000 smartphones a day ahead of its release later this year. Estimates place fourth quarter sales near 22 million.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

iPhone 5 Frenzy Hits Fever Pitch
News flash: Someone may or may not have seen the iPhone 5 in a reflection of a picture of sushi. Isn't this getting crazy?

Gmail Add-On Boosts Support Features
The Shared Inbox add-on for Google Apps Business accounts is designed to provide improved help desk and customer support ticket features for businesses using Gmail as their main communications platform.

 

SLIDESHOWS

10 Lessons Learned By Big Data Pioneers How can you prepare for the big data era? Consider this expert advice from IT pros who have wrestled with the thorny problems, including data growth and unconventional data.   View Now

ALSO SEE
10 Key Steve Jobs Moments and Innovations
10 Cool Social Media Monitoring Tools

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

ALSO WATCH
MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing

MORE VIDEOS

spacer
 


WEBCASTS
Broken State of Backup
Data protection industry analysts agree that "backup is broken." In this webcast we'll identify key areas where current backup models are failing and how to resolve those issues. It happens Thursday, October 20, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration

Click here

 


RESOURCES AND EVENTS
Don't Miss Interop New York
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today

This e-mail was sent to %%email%%
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.