MUST READ
Anonymous Drives Security Fears, But Not Spending By Mathew J. Schwartz Information security budgets remain focused on stopping malware and advanced persistent threats (APTs), which tend to do more damage in the long run than hacktivists' SQL injection and DDoS attacks.
RELATED • Federal IT Survey: Hacktivists, Cybercriminals Are Top Threats • Who Is Anonymous: 10 Key Facts
Lawmakers Slam USAID Outsourcing Training Program
Congressmen say U.S.-funded initiative to train call center workers in the Philippines puts American jobs at risk.
Infor Socializes, Localizes Its Enterprise Apps
Infor blends social-networking and a cloud-based tax and regulatory approach with its down-to-business ERP systems.
Google Continues Product Purge
Google shutters Patent Search, Flu Vaccine Finder, and Google Related in ongoing trimming of services.
Samsung Preps New Phone, Tablet, Cloud Service
Samsung will show off a new Galaxy smartphone May 3, but rumors also point to a new Galaxy tablet and cloud-based storage service.
Gmail Analytics: Gain Insights, Improve Your Productivity
It's not quite big data, but even a modest amount of data about the way you use Gmail has the potential to make you more productive.
Bazaarvoice Adds SAP, Salesforce.com Integration
Social comments, ratings, and reviews tool will provide real-time feeds for service and support.
|
|
QUOTE OF THE DAY You must lose everything in order to gain anything.
-- Brad Pitt
ALSO SEE
• |
recipientid" style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">Gmail Analytics: Gain Insights, Improve Your Productivity
|
• |
Bazaarvoice Adds SAP, Salesforce.com Integration
|
• |
recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">
Strategy: Development Labs in the Cloud |
• |
recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">
Seven Steps for Building Security in the Cloud from the Ground Up |
• |
recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 11px; color: #003bb0;">
10 Essential Android Apps For SMBs |
• |
Prepare Your Infrastructure For The Cloud Using Open Standards |
• |
It's Coming: Interop Las Vegas |
Check out our lineup for the Next Valley View (our live Web TV show) TOMORROW, 4 pm PT in our SF HQ:
• Zynga CTO Allan Leinwand
• Hands-on technology demonstrations from SuccessFactors, DataSift, and Proton Media
• A unique look at the latest from ARM at the Valley View Whiteboard
• Prize giveaways and much more!
Register to win prizes and watch the show live; or if you're in the area Contact us to be part of the live audience
|
|
|
|
|
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S DIGITAL ISSUE
Hacktivist and cybercriminal threats concern IT teams most,
our first Federal Government Cybersecurity Survey reveals.
Here's how they're fighting back.
Also: Why federal efforts to cut IT costs don't go far enough, and how the State Department is enhancing security.
DOWNLOAD NOW FREE (Registration Required)
|
|
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: Development Labs in the Cloud
The options available for putting a lab in the cloud are increasing. We take a look at the costs, complexities and challenges involved in making a move to either a public or private cloud lab, and help you figure out how to get there.
Download Now (Registration Required)
|
|
Informed CIO: Is Your IT Infrastructure Ready for Mobility?
No one likes to think about a large meeting with multiple mobile devices bringing a WLAN to its knees, but we've seen it happen. Here's how to help your wired and wireless networks seamlessly support mobile and/or remote users--and not buckle under pressure.
Download Now (Registration Required)
|
|
|
|
|
|
FEATURED WHITEPAPERS
Seven Steps for Building Security in the Cloud from the Ground Up
If you are considering a leap to the cloud, you are no doubt figuring out how to extend security to the new environment. Despite potential savings, security is still the number one barrier. Download this white paper to review seven steps to help you build security into your cloud applications. recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;"> Download Now (Registration Required)
Forrester Report: Killing Data for Security and Risk Professionals
As cybercriminals have become more sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. Read this white paper to learn how to encrypt data, and make cybercriminals look for less robustly protected targets. recipientid"
style="font-family: Arial, Helvetica, Geneva, SunSans-Regular, sans-serif; font-size: 12px; color: #003bb0;"> Download Now (Registration Required)
|
MOST POPULAR NEWS
10 Essential Android Apps For SMBs
No glitz, no glamour, just results: These 10 budget-friendly Android apps help SMB users simplify everyday tasks and power through to-do lists.
TSA Tests Identity Verification System
In wake of invalid boarding pass scares, Transportation Security Agency seeks to automate the process of authenticating travel documents and matching them to IDs.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
iPhone 5 May Get New Display, 'Liquidmetal'
Reports that surfaced this week suggest the next iPhone will use brand-new touch screen technology and will be encased in something called "liquidmetal."
Oracle Vs. Google: Tour The Evidence
Oracle and Google continue to fight a nasty courtroom battle over patent and copyright claims involving Java and mobile phones. Consider some of the crucial evidence introduced so far.
RESOURCES AND EVENTS
It's Coming: Interop Las Vegas
See the future of business technology at Interop Las Vegas, May 6-10. It's the best place to learn how cloud computing, mobile, video, virtualization, and other key technologies work together to drive business. Register today with priority code CPQCNL07 to get a free Expo Pass or to save 25% on Flex and Conference passes. Don't Miss It -- Register Today!
This e-mail was sent to EmailAddress
|
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
|
|
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a
moment to add the newsletter's address to your anti-spam white list:
[email protected]
If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our
Privacy Statement.
|
|
|
|