Wednesday, November 19, 2014

7 commonly overlooked ways to tighten cybersecurity

US Senate fails to move forward on NSA reform bill

Nokia's N1 Android tablet is actually a Foxconn tablet

ITworld Today
November 19, 2014

7 commonly overlooked ways to tighten cybersecurity

It's OK to be paranoid about every last detail when it comes to security.

READ MORE
 

Issue highlights

1. US Senate fails to move forward on NSA reform bill

2. Nokia's N1 Android tablet is actually a Foxconn tablet

3. INSIDER 12 security problems that EMV and tokenization won't solve

4. How to be the CIO of tomorrow (CIO.com)

5. Facebook's Flow could help JavaScript programmers spot elusive bugs

6. Researchers push supercomputing's bleeding edge with diverse applications

7. A look back at 2014's data protection nightmare (CSOonline.com)

8. Why AT&T and Sprint just announced business conferencing services

9. BOOK GIVEAWAY: Responsive Mobile Design: Designing for Every Device

Resource compliments of: Samsung

Smartify your business with Samsung printers.

Learn more about the world's first printers powered by Android™ Click to continue

US Senate fails to move forward on NSA reform bill

The U.S. Senate has voted against a bill that would rein in the National Security Agency's bulk collection of telephone records within the country, possibly killing any NSA reforms until next year. READ MORE

Nokia's N1 Android tablet is actually a Foxconn tablet

Nokia has partnered with Foxconn to bring to market the first Nokia-branded, Android-powered device. READ MORE

INSIDER

12 security problems that EMV and tokenization won't solve

In the coming year, a lot of retailers will be switching to new, EMV-compliant point-of-sale terminals -- and, while they're upgrading, many will also roll out tokenization and end-to-end encryption as part of the package. This will dramatically increase security in the area of retail payments. But it doesn't mean that the retail industry will instantly become bullet-proof. READ MORE

How to be the CIO of tomorrow (CIO.com)

What does the future CIO look like? He or she probably won't have a technology background. However, this new kind of CIO will not only have to lead a technical staff but will also be a leader of leaders in the boardroom. READ MORE

White Paper: OutSystems

Why IT Struggles with Mobility

This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions. Learn More

Facebook's Flow could help JavaScript programmers spot elusive bugs

Facebook has released as open source a debugging tool for JavaScript, called Flow, designed to highlight problems caused by the misuse of data types. READ MORE

Researchers push supercomputing's bleeding edge with diverse applications

The five finalists for this years ACM supercomputing award pioneered new architectures and case models. READ MORE

A look back at 2014's data protection nightmare (CSOonline.com)

There were nearly one billion records compromised in 2014, due in part to poor supply chain protection, malicious insider access, and lackluster access management policies. Today, Salted Hash looks back at the facts and figures of a nightmarish year in information security. READ MORE

Why AT&T and Sprint just announced business conferencing services

Two separate business conferencing services announcements from AT&T and Sprint on Tuesday highlight the radically changing business models at U.S. wireless carriers. READ MORE

BOOK GIVEAWAY: Responsive Mobile Design: Designing for Every Device

Learn how to create Web designs that work on any device. We've got 5 copies to give to some lucky readers. Enter now for your chance to win! READ MORE

White Paper: CommVault

IDG MarketPulse: Lighting Up Dark Data CIO Research Paper

On average, just 28 percent of organizational data is stored because it has clear business value. Ominously referred to as dark data, those information assets grow and soak up resources without returning any business value. Learn More>>

NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!
 
Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 8 tech buzzwords that you need to know
 

- Free and cheap ways to learn about network administration
 

- IT resumes: Lies, half-truths and embellishments

SALARY SURVEY

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.