Monday, December 22, 2014

10 tech developments that made 2014 an amazing year

ITworld Today - Newsletter

Wanted for hire: Engineers with ideas of their own. View it in your browser

Staples security breach: Check if your store was among the many with stolen credit card info. View it in your browser

ITworld Today
December 22, 2014

10 tech developments that made 2014 an amazing year

This year saw PCs bounce back, the Internet of Things take on meaning, attacks become blended and massive, Google Glass getting people beat up … and much more. READ MORE

 

Issue highlights

1. INSIDER Wanted for hire: Engineers with ideas of their own

2. Staples security breach: Check if your store was among the many with stolen credit card info

3. Sony hack was 'cyber vandalism,' not act of war, says Obama

4. South Korea nuclear operator runs drill after alleged hacker threat

5. Tor warns of possible disruption of network through server seizures

6. The four Mac security options everyone should know

7. 10 cool marketing automation startups to watch (CIO.com)

8. What story are security leaders telling themselves? (CSOonline.com)

9. BOOK GIVEAWAY: Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition

: Venafi

IT Security's Responsibility: Protecting Mobile Certificates

When it comes to protecting mobile certificates, IT security leaders must act responsibly - with next-generation trust protection. Find out how Forrester rates IT security leaders' knowledge and understanding of keys and certificate technologies for mobile. Learn More

INSIDER

Wanted for hire: Engineers with ideas of their own

Cambridge Consultants depends on the creativity of its engineers to solve problems for its clients. READ MORE

Staples security breach: Check if your store was among the many with stolen credit card info

Staples just announced that hackers got access to 1.16 million customers' payment cards at 115 stores nationwide. If you've shopped at staples in the last few months, you'll probably want to check this list of affected stores. READ MORE

Sony hack was 'cyber vandalism,' not act of war, says Obama

Obama's remarks are important for framing what might come next. READ MORE

South Korea nuclear operator runs drill after alleged hacker threat

Government launched probe but says leaked data does not threaten safety. READ MORE

: CDW

Mobile Security Infographic "The Dawn of a New Era"

Mobile technology is a critical tool for successful organizations, but the risks it faces are growing rapidly. Threats from mobile malware, hackers and other vectors are increasing in number and sophistication. View Now

Tor warns of possible disruption of network through server seizures

Tor did not name the group that it expects may seize its specialized servers called directory authorities. READ MORE

The four Mac security options everyone should know

By default, the Mac is pretty secure. But with the help of a couple of built-in options, you can make it even more so. Topher Kessler explains. READ MORE

10 cool marketing automation startups to watch (CIO.com)

Marketing automation can help can help businesses better target prospects, find and test new products and services. These 10 startups can help businesses plug gaps in their marketing strategy and offer solutions to problems companies might not even know they have. READ MORE

What story are security leaders telling themselves? (CSOonline.com)

Surrounded by negative stories about security, the key to successful leadership is to change the stories we tell ourselves. READ MORE

BOOK GIVEAWAY: Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE

WHITE PAPER: Alert Logic

Leader in Forrester Wave evaluation of emerging MSSPs

In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market. Learn More

BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition
 

- Data analytics scores marketing wins for the Texas Rangers
 

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.