Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Protecting SaaS User Data | Is Win 8 Microsoft's Last Chance?

InformationWeek Daily
InformationWeek Daily  
  Monday, September 12, 2011
Between The Lines ColumnistWindows 8 Could Make Or Break Microsoft
By Paul McDougall
BUILD conference will give developers their first in-depth look at what may be Redmond's last chance to play in the tablet market.

Samsung May Ditch Windows Phone 7 Next Year
Windows 8 Boot Time Will Wow, Microsoft Says

Protecting SaaS Users From Identity Exploits
A variety of attacks can be used to gain access to SaaS apps. Here's how to protect user accounts from exploit.

Google Apologizes For App Engine Confusion
Higher App Engine prices may be here to stay, but Google is providing tools to help reduce costs.

Got Culture? Use It To Drive A Successful Social Business
Cultural change will likely be a long-term outcome of a social initiative, but it shouldn't be the goal.

Presdo Makes Connections Through LinkedIn
LinkedIn's original CTO Eric Ly is tapping the LinkedIn social graph to enhance his latest venture, Presdo, which helps professionals connect at events such as conferences.

DigiNotar Attack A Reminder To Focus On Basics
Sure, it's a big, scary world right now, but IT leaders need to stay focused on comprehensive security programs.

SaaS Productivity Apps: Ready For Business?
Google, Microsoft and others are pushing SaaS-based e-mail, word processing, collaboration, and more. We examine the case for cutting ties to on-premises office software.

Protecting SaaS Users From Identity Exploits
A variety of attacks can be used to gain access to SaaS apps. Here's how to protect user accounts from exploit.

Forgiveness is the economy of the heart... forgiveness saves the expense of anger, the cost of hatred, the waste of spirits. -- Hannah More


SaaS Productivity Apps: Ready For Business?
Protecting SaaS Users From Identity Exploits
State Of Storage 2011 Report: Consolidation And Centralization
10 Reasons to Modernize the Desktop
100 Years Of IBM: 25 Historic Milestones
Broken State of Backup
Don't Miss Interop New York

Posted By RGLASSMAN000:
"Hotmail suffers from the same vulnerability that every network related service suffers from. Human beings. People make mistakes. The best laid plans can take an unexpected turn during execution."
In reply to: Hotmail Disruption Sparks User Protests
View Entire Response | Post Your Own Reply

"I understand that the inclusion of this feature in Lion OS is new to apple, but that doesn't mean new for everyone. Nor does it mean that it is something brought on by the tablet revolution."
In reply to: Windows 8 Could Make Or Break Microsoft
View Entire Response | Post Your Own Reply

  Digital Issue  
New SaaS productivity apps promise to replicate the desktop experience --if you can get past security and data ownership concerns.

ALSO: Beware these common exploits against Web-based apps put your users' credentials in jeopardy, Kurt Marko says.

DOWNLOAD NOW (Registration Required)


State Of Storage 2011 Report: Consolidation And Centralization
Download this report to see how smart CIOs will accelerate this trend by adopting new multipurpose arrays and converged networks.
Download Now (Registration Required)
Featured Report

Deduplication To Optimize Disaster Recovery
Designing infrastructure for business continuity and disaster recovery requires a mix of business and technological savvy. Deduplication at the disk and the network level can make it easier to move and store critical information in your DR environment.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
10 Reasons to Modernize the Desktop
IT departments need a solution that meets the evolving needs of both the employees and IT - something not possible with a traditional PC model. Download this white paper to review the benefits of moving beyond the physical PC to a modern desktop that is highly flexible, easy to manage, customizable to suit users' needs, and ready for new and future technology.
Download Now (Registration Required)

7 Types of Power Problems
Many of the mysteries of equipment failure, downtime, software and data corruption, are often the result of a problematic supply of power. Discover the most common types of power disturbances, what causes them, what they do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Download Now (Registration Required)


100 Years Of IBM: 25 Historic Milestones
IBM this week celebrates 100 years of innovation and business optimization. From punch cards to the S/360, from tabulators to teraflops, from CEO Watson to supercomputer Watson, IBM has a unique history. Take a visual tour back through the decades.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

Hotmail Disruption Sparks User Protests
Protests alert Microsoft to Hotmail problem Thursday night; users from around the world chime in until service restored.

12 Hot Mobile Medical Apps
Mobile medicine is everywhere. There's the iPhone app that lets you cut away images of muscle layers to see what lies beneath, an e-health record system for the iPad, and a smartphone-based blood pressure monitor. Here are a dozen innovative ones.

Gmail Add-On Boosts Support Features
The Shared Inbox add-on for Google Apps Business accounts is designed to provide improved help desk and customer support ticket features for businesses using Gmail as their main communications platform.



HP's New Strategy: Exclusive User Research
When InformationWeek asked IT pros about HP's recent change in course, they spoke clearly--that HP's future direction looks anything but clear. Check out the full survey results.   View Now

10 Key Steve Jobs Moments and Innovations
Top 20 Add-Ons For Microsoft SharePoint


spacer spacer spacer
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing



Broken State of Backup
Data protection industry analysts agree that "backup is broken." In this webcast we'll identify key areas where current backup models are failing and how to resolve those issues. It happens Thursday, October 20, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration

Click here


Don't Miss Interop New York
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.