Issue highlights 1. First Look: Gigabit Wi-Fi adapters 2. Review: Apple's 15-in. MacBook Pro delivers on speed, battery life 3. Google dives into robotics with Boston Dynamics buy 4. US NSA debates amnesty for Edward Snowden 5. Box has been thinking outside of the cloud 6. Lulzy Christmas: Hackers buy presents for the poor with gov't officials' credit cards 7. Using SDN to Create a Packet Monitoring System 8. Bogus antivirus program uses a dozen stolen signing certificates 9. On the Internet, perhaps Twitter doesn't want you to be a dog 10. Strong opportunities and some challenges for big data security analytics in 2014 11. 20 Best iPhone/iPad Games of 2013 12. China lands rover on moon's surface, a first for the country 13. But wait -- there's more! 8 tech gadgets that multitask |
RESOURCE COMPLIMENTS OF: Check Point Software Technologies Based on research of nearly 900 companies, the Check Point 2013 Internet Security Report uncovers major security risks organizations are exposed to on a daily basis. Discover how often Bots endanger your enterprise. See how commonly-used Web applications can be high risk. Learn how easy it is to experience unintentional data loss. Read Full Report. |
At some point, desktops and laptops will come with the new Gigabit Wi-Fi standard 802.11ac built in. But if you can't wait and want to speed up the wireless links on your existing devices, you can buy an 802.11ac adapter today. READ MORE |
Apple's newest 15-in. MacBook Pro looks just like last year's model but delivers on faster performance and solid battery life, says columnist Michael deAgonia. READ MORE |
Google has confirmed it's buying Boston Dynamics -- one of the most well-known robotics companies in the world -- but isn't saying much about why. READ MORE |
The person running a U.S. National Security Agency task force to assess the damage of the leaks by Edward Snowden told a TV network that granting him amnesty is "worth having a conversation about." READ MORE |
WHITE PAPER: Dell Protecting your company's critical data is a critical, mandatory part of an Exchange administrator's tasks. In this white paper, learn about the data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Read now! |
Many people think of Box as a cloud company. But really, it's a collaboration company, says Vikrant Karnik, senior vice president of enterprise cloud consulting services for systems integrator Capgemini, a newly minted Box partner. READ MORE |
While there's nothing quite like the warm and fuzzy feeling of giving gifts to the less fortunate, TeamBerserk hacktivists are donating "thoughtful gifts" that are paid for with credit cards belonging to naughty government officials, politicians and corporations. READ MORE |
Because of the limitations of SPAN/monitor ports on switches, organizations have turned to using taps and packet monitoring switches. These solutions can be expensive which has lead companies to look for alternatives. Establishing a packet monitoring system is one of the use cases for Software-Defined Networking (SDN). This solution uses lowe READ MORE |
A fake antivirus program in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday. READ MORE |
WHITE PAPER: Attachmate To meet the demands of today's business landscape, IT staffs must take steps to secure and integrate their information assets, while satisfying compliance mandates and optimizing corporate efficiency. This white paper presents managed file transfer (MFT) as a way to meet corporate information and data management requirements. Read More |
READ MORE |
My friends on Wall Street and Sand Hill Road will likely place a number of bets on big data security analytics in 2014. Good strategy as this market category should get loads of hype and visibility while vendor sales managers build a very healthy sales pipelines by March. Yup, there should be plenty of opportunities for big data security analytics to enter the enterprise security mainstream because... READ MORE |
20 Best iPhone/iPad Games of 2013 Puzzles, adventure games, dungeon crawlers, and more fun for your favorite iOS device (during off-work hours, of course). READ MORE |
China's lunar probe, and the moon rover it carried, landed successfully Saturday night, marking a major accomplishment for the country's space efforts. READ MORE |
Looking for a really multifunctional gift? These mobile devices offer at least two (and sometimes more) uses -- and in very imaginative ways. READ MORE |
WHITE PAPER: CDW Find out what steps to take that can lead your organization down the smooth path to SAM deployment. This SAM primer can help you and your organization mitigate software non-compliance issues and optimize software license management while containing costs. Read Now |
|
No comments:
Post a Comment