---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: May 23, 2014 9:34 AM
Subject: 21 more crazy and scary things the TSA has found on travelers
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News PM | | This year the TSA found everything from Bazooka rounds to a medieval mace and bones | | Issue highlights 1. New iOS app secures IM traffic with 'post quantum' encryption scheme 2. INSIDER 10 cities that provide 1-Gig internet services 3. How IBM Plans to Get With the Times 4. 10 tools for stealthily slacking off at work 5. Cisco Live lives it up at 25 6. Does the CFO Need to Become a Technologist? 7. Security Threat Landscape: May 2014 8. New generic top-level domain names do more harm than good 9. Dark Wallet--Threat or No Threat? 10. IT power grab: Should you be a Machiavellian manager? 11. Department of Justice bashes $20 million identity refund fraud ring 12. 20 cool things you can do with a Raspberry Pi | : LogMeIn This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization. Learn More | A new instant messaging application for the iPhone uses an advanced, "post quantum" encryption scheme to scramble one-on-one chats. It's intended as a bullet-proof secure alternative to WhatsApp's addictive message interface and to mobile carrier's primitive and (outside the U.S.) pricey SMS texting services. READ MORE | Municipal broadband is becoming a contentious issue in the race to establish ubiquitous high-speed Internet throughout the United States. READ MORE | This week's IBM Edge2014 infrastructure event hinted at how the company plans to use experience to its advantage. Far from burning out or fading away like an aging rock star, IBM intends to join today's young rockers on stage -- and steal the show. READ MORE | We're all about helping you be more productive, but to stay at the top of your game you need occasional downtime. Can it be helped that sometimes the need strikes while your at work? READ MORE | WEBCAST: Dell SecureWorks Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more | It started with a sobering declaration and ended with what for some was an inebriating party. READ MORE | Technology today, particularly big data and analytics, is disrupting roles throughout the enterprise, whether it's the CIO that needs to seek new ways to be a strategic partner to the business or the CMO constantly faced with decisions about technology that can make the marketing function more data-driven and efficient. Even the CFO role is not immune. READ MORE | In this month's episode, Keith Shaw (IDG Enterprise) and Derek Manky (Fortinet) discuss the BlackShades arrests, ransomware updates, new evasion techniques and other security threats seen this month. READ MORE | It's been a few months now since the bevy of new generic top-level domains (gTLDs) were made available. These were supposed to rock the domain name registration business and change the Internet landscape forever. We're all used to the traditional TLDs, such as .net, .com and .org, and the point of the initiative is to add a bunch of new gTLDs to create more options because the Internet is running... READ MORE | WEBCAST: Sourcefire, now part of Cisco This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >> | The Fuss About Dark Wallet READ MORE | Two recent works from leading analyst firms throw down the gauntlet to CIOs: Once IT leaders fully embrace the power they hold in the enterprise, they can stop taking orders and start giving advice. READ MORE | The US Department of Justice said 10 people were indicted today for their roles in a $20 million stolen identity refund fraud conspiracy. READ MORE | Get creative. No, more creative than that. Keep going. READ MORE | WEBCAST: IBM Live event: Tuesday, June 17, 2014 1 PM ET / 12 PM CT / 10 AM PT What if you could reduce your storage costs by half? Attend this webcast to hear how you can maximize the economics of your data center by modifying your storage footprint and power usage using Flash Storage, and to learn how IBM is accelerating storage efficiency. Register Now | | | | | | | | |
No comments:
Post a Comment