TODAY'S TOP STORYTop 10 Security Stories Of 2010From WikiLeaks to breaches, security-related stories are front-page news more than ever. Small wonder: Hacks can cost companies millions and bring down infrastructure. Here's a look back at the year in security.
ALSO SEE
iPad 2 Smaller, Flatter, More Capable Speaker
Details of Apple's second-generation iPad continue to pop up across the Web. The newest details suggest the iPad 2 will have a reduced bezel and flat back panel.
Skype Struggling To Recover From Outage
Millions of Skype users have been unable to make voice or video calls over the VoIP service since Wednesday.
Pioneer Ships First 3D Blu-ray Players
The three models support the latest HDMI and audio formats, and can access content from streaming video services.
Google Buys NYC Building For $1.9 Billion
The 15-story Manhattan property covers a full block and has more office space than the Empire State Building.
Dell Acquiring Medical Storage Firm InSite One
The cloud-based service addresses some of the biggest problems in health IT: data archiving, migration, and sharing medical images across providers, systems, and locations.
VA Employees Using Unauthorized Cloud Services
Department of Veterans Affairs staff have been using Google and Yahoo tools without the agency's knowledge, raising privacy, security concerns.
Data Center Upgrades Spur Surge In Network Equipment
Infonetics research says cloud computing will fuel large gains in the 10G Ethernet and storage markets through 2014.
DDoS Attacks Strike Human Rights Groups
Harvard researchers find that most such organizations and independent media sites have been knocked offline by a distributed denial of service attack.
Sony Launches Online Music Streaming Service
The cloud-based Qriocity becomes a stronger competitor to Apple's iTunes with the addition of music to its existing video-on-demand offerings.
|
 |
|
DOWNLOAD OUR MOBILE COMPUTING DIGITAL SUPPLEMENT
Giving your people the tools to work from anywhere isn't easy,
but it pays. IT industry veteran Kurt Marko shares 10 best practices.
ALSO: The U.S Patent and Trademark Office's CIO tells how the agency
lets employees use their home computers to connect to their office
desktops.
DOWNLOAD NOW (Registration Required)
|
|
ANALYTIC REPORTS & WHITEPAPERS
|
SLIDESHOWS
Top 10 Security Stories Of 2010
As smartphones and tablets complement and battle with notebooks and PCs as routes to the connected world, as corporate users and consumers turn to both traditional Web sites and newer social networking sites to communicate, share ideas, trade business concepts, and shop, corporate IT professionals and the government organizations overseeing the nation's cybersecurity are all-too aware they must do more. And they must do it fast. Recognizing this, the federal government hopes to create a new wave of cybersecurity educational and certification programs in order to form the next, much-needed workforce. And law enforcement agencies around the world are becoming more adept at working cooperatively to combat the growing number, complexity, and sophistication of cyber criminals that pursue money and power through their creation of malware and network destruction. This teamwork already has brought down some botnet gangs in different nations. View Now
|
|
ALSO SEE
• Top 10 Hardware Stories Of 2010
• Top 10 Microsoft Stories Of 2010
MORE SLIDESHOWS
|
|
 |
 |
 |
|
 |
FEATURED BLOG
Got The Gadget; Lost The Manual
By Kurt Marko
Many techies and their families will have one or more gadgets under the tree this weekend, yet despite Steve Jobs' best intentions, many of them still need a manual.
ALSO SEE
Will Malware Hit Smartphones In 2011?
By Ed Hansberry
Malware, viruses and the like have been a routine part of life for PC owners for years, at least if you are running Windows. Smartphone users have been largely ignored by the malware community, but that will inevitably change. Will it be sooner rather than later?
Microsoft Moves To Block Zero Day Attack
By George Hulme
A French IT security firm recently warned of a new vulnerability that opens most versions of Microsoft Internet Explorer open to attack.
Share Your Thoughts On IT Risk Management
By Kurt Marko
"In today's interconnected world, filled with increasingly sophisticated yet generally anonymous malefactors, IT must have a risk management program." Most of us have heard this so many times it goes in one ear and out the other, making about as much impression as your grandmother's homespun advice to always brush after meals and never run with scissors. But we all know grandma was right.
Why All The Big Deals?
By George Crump
Have you noticed that there seems to be a lot more 'big' deals when it comes to storage acquisitions lately? Dell-Compellent, EMC-Isilon, HP-3PAR, EMC-Data Domain. This is not to say that there hasn't been smaller deals and part of the reason for the increase in big deals is perception, there is more to discuss which generates more press. There is however strategic reasoning behind the increase in larger deals.
Where is your Data Tonight? A Lesson in Avoiding Headlines, Fines or Worse
Since 2005, over 510,000,000 potentially sensitive records have been lost, stolen or mishandled. A slew of regulations now require breach notification, meaning enterprises must practice strong data protection. What role does encryption play in protecting data, and how is hardware-based encrypting different from alternatives? This session will review key concepts of encryption, industry standards from the Trusted Computing Group for hardware-based encryption, and deploying such drives in the enterprise. More Information & Registration
|
 |

|
Take Our Analytics Risk Survey
For the 14th consecutive year, InformationWeek Analytics is conducting its U.S. IT Salary Survey. To date, over 180,000 IT professionals have participated.
Upon completion, you will be eligible to win a first prize of a Sony Bravia 60-inch HDTV, second prize of a 64-GB Apple iPad with Wi-Fi and 3G, or third prize of a Sony home theater system. You will also be sent a link to download the 2011 U.S. IT Salary Report once it has been published. Take The Survey Today
|
This e-mail was sent to %%email%%
InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030
To subscribe to our other newsletters, change your e-mail address or format (Text/HTML) or to unsubscribe, click here
|
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:
|
|
|
|