Issue highlights 1. Big data's dirty little secrets 2. INSIDER SDN: The security pros and cons of using it in your organization 3. McAfee Advanced Threat Detection: A Sign of Things to Come 4. Apple to reveal new iPads Oct. 22 5. Hackathons for the rest of us 6. 6 cool new wireless technologies from MIT 7. Nike sprints from offshore to onshore developers 8. Security automation research, with a human touch, could net nearly $50M grant 9. IBM's Power7+ remains alive with new integrated servers 10. iPhone 5s offers better security today, a peek at Apple of tomorrow 11. D'oh! Basic flaw in WhatsApp could allow attackers to decrypt messages 12. Ultimate guide to the paperless office 13. VM-based storage platform scales out to multiple sites 14. Big data's dirty little secrets 15. McAfee Advanced Threat Detection: A Sign of Things to Come 16. Most costly cybercrime attacks: Denial-of-service, malicious insider and web-based 17. Adobe's breach casts doubt on their SaaS business model |
WHITE PAPER: HP and Intel® Xeon® processors This paper looks specifically at the considerations and benefits achievable when an organization deploys data protection architectures powered by HP StoreOnce appliances and Catalyst APIs with Symantec OpenStorage Technology (OST). Learn More |
Big Data is one of the hottest trends in enterprise IT right now, and for good reason. The ability to collect, store, and analyze unprecedented quantities of all kinds of data promises to remake everything from weather forecasting to consumer marketing. But while that promise is being realized at a few pioneering companies, from Amazon and Macy's to Google and Facebook, many other organizations are... READ MORE |
SDN benefits include automating and easing network administration duties and improving application performance. But it also introduces a number of potential threat vectors into your environment. What should you know before you invest in SDN? READ MORE |
With the glitz and glamour of Las Vegas as a backdrop, McAfee rolled out its Advanced Threat Defense (ADT) strategy last week. Yes, McAfee now offers a sandboxing appliance of its own but it would be foolish to judge this announcement based on its security device alone. McAfee's ATD is actually an integrated architecture that goes beyond detection. McAfee's ATD message is actually, "find,... READ MORE |
Apple will introduce new iPad tablets on Oct. 22, coinciding with the unveiling of the company's fourth-generation iPad and iPad Mini in 2012. READ MORE |
Forget softball games. Hackathons promote togetherness among techies while benefiting the enterprise, and no one gets pitcher's elbow. READ MORE |
RESOURCE COMPLIMENTS OF: Enterprise Mobility Management Tech Seminar Attend this content-rich, one-day event and determine the next steps to take as you hear from mobility experts, enterprise IT professionals and leading product and service providers. Thursday, November 14, 2013. 8:00 am-4:15 pm. W Dallas - Victory Hotel. Register now |
MIT grad students show off their research at Wireless Retreat READ MORE |
With its apps, sensors and devices, Nike is increasingly becoming a technology company. It's found the best development teams come from onshore, not offshore, outsourcers. READ MORE |
Researchers from Carnegie Mellon University and Army Research Laboratory will join forces with those from a handful of universities in an effort to better automate cybersecurity decisions. The five-year project has attracted $23.2 million in funding from CMU's CyLab, and could be extended to $48.2 million over 10 years. READ MORE |
IBM's decision to license its future Power8 processor to third parties doesn't mean life has ended for the current Power 7+, which will go alongside x86 chips into new PureFlex System preconfigured servers announced on Wednesday. READ MORE |
The iPhone 5s, like its cheaper sibling the iPhone 5c, has been available for a few weeks now, earning plaudits from most reviewers and igniting ignorant online discussions around mobile security and application performance. Some of that ignorance is intentional FUD from Android fanboys and security purveyors. READ MORE |
WHITE PAPER: CDW Take the time to understand and learn to apply the requirements for locking down payment card data. Read Now |
The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer. READ MORE |
You have no excuse for being buried under paper these days. The tools to digitize most or all of your pile are readily at hand and very affordable. We're not exactly a paperless society yet, but this guide will help you get to less paper, and that's a step in several right directions: increased efficiency, better security, and a reduced environmental footprint. We've also added a few ways to eliminate paper from your workflow, the better to declutter your office--and your mind. READ MORE |
Enterprises that want their storage organized around virtual machines will get more hardware options and greater scalability later this year from Tintri, a startup that specializes in VM-based storage. READ MORE |
Big Data is one of the hottest trends in enterprise IT right now, and for good reason. The ability to collect, store, and analyze unprecedented quantities of all kinds of data promises to remake everything from weather forecasting to consumer marketing. But while that promise is being realized at a few pioneering companies, from Amazon and Macy's to Google and Facebook, many other organizations are... READ MORE |
With the glitz and glamour of Las Vegas as a backdrop, McAfee rolled out its Advanced Threat Defense (ADT) strategy last week. Yes, McAfee now offers a sandboxing appliance of its own but it would be foolish to judge this announcement based on its security device alone. McAfee's ATD is actually an integrated architecture that goes beyond detection. McAfee's ATD message is actually, "find,... READ MORE |
$11.56 million is the mean average cost of cybercrime per U.S. corporation, ranging between $1.3 million to $58 million, according to the fourth annual Cost of Cyber Crime study conducted by the Ponemon Institute. That is up 78% from four years ago and increased 26% from the average cost reported in 2012. READ MORE |
By now you should have heard about the latest massive breach over at Adobe. Besides the source code for Acrobat and Cold Fusion, something like 3 million accounts were breached as well. READ MORE |
WHITE PAPER: Crittercism Most enterprises are looking for ways to leverage their investments in web technology to handle mobile app performance, but between monitoring, OS variants, screen sizes and OEMs, this can be a costly and complex approach. This 2013 Mobile APM Report highlights best practices for meeting mobile app challenges and ensuring mobile app performance. Read more! |
|
No comments:
Post a Comment