Monday, January 5, 2015

How an acute shortage of cyber talent gave rise to 'spooks as a service'

UTM Shootout: Security appliances for SMBs are smaller, more powerful and packed with new features. View it in your browser

WIN THIS BOOK: Learning Swift Programming. View it in your browser

ITworld Today
January 05, 2015
INSIDER

How an acute shortage of cyber talent gave rise to 'spooks as a service'

As the list of victims of sophisticated cyber attacks expands, so does the need for high-priced talent to help investigate and recover from those attacks. The latest solution: hosted services offering access to cyber intelligence and incident response to customers who lack it. READ MORE

 

Issue highlights

1. UTM Shootout: Security appliances for SMBs are smaller, more powerful and packed with new features

2. WIN THIS BOOK: Learning Swift Programming

3. State of the CIO: CIOs need to snap out of complacency (via CIO)

4. Lenovo slims down, adds horsepower to new ThinkPads

5. White House approves sanctions against North Korea for Sony hack

6. The biggest challenges faced by CIOs/CISOs heading into 2015 (via CSOonline.com)

7. New lie detector relies on full-body suit for better accuracy

8. Driverless cars could get more reliable with Nvidia's Tegra X1

9. Google discloses unpatched Windows vulnerability

10. HP's Zvr 'virtual reality' display shows holographic projections

11. iPhone dongle sends 100MB to other iOS devices in seconds

WHITE PAPER: Attachmate

Enterprise File Sharing and Management

Dynamic file sharing across multiple platforms is the new normal in the world of work, creating an urgent need for large and highly-regulated enterprises to explore file sharing solutions that do not compromise data security. Learn More

UTM Shootout: Security appliances for SMBs are smaller, more powerful and packed with new features

Vendors are coming up with new ways to fit enterprise-grade security features into more compact and more powerful appliances. READ MORE

WIN THIS BOOK: Learning Swift Programming

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE

State of the CIO: CIOs need to snap out of complacency (via CIO)

Your business colleagues aren't as impressed with you as you are. CIO magazine's 14th annual State of the CIO research rewrites your priorities for 2015. READ MORE

Lenovo slims down, adds horsepower to new ThinkPads

Lenovo's new ThinkPad Carbon and T450 lines now have Intel's Broadwell chips. READ MORE

White House approves sanctions against North Korea for Sony hack

The economic sanctions are the 'first aspect' of the U.S. government's response to the Sony hack. READ MORE

WHITE PAPER: F5 Networks

Operationalizing the Network with SDN

SDN enables organizations to achieve greater economies of operational scale through the use of APIs to automate and orchestrate the network, as well as the application services that support applications. Read this whitepaper to learn how applications are driving new requirements that require disruptive, radical change. Learn more >>

The biggest challenges faced by CIOs/CISOs heading into 2015 (via CSOonline.com)

And the most important items to have in your security sandbox. READ MORE

New lie detector relies on full-body suit for better accuracy

Suits normally used by 3D graphics animators could help law enforcement spot lies. READ MORE

Driverless cars could get more reliable with Nvidia's Tegra X1

Nvidia did not address the use of the new Tegra chip in mobile devices. READ MORE

Google discloses unpatched Windows vulnerability

Microsoft didn't fix the bug within a 90-day deadline Google imposed. READ MORE

HP's Zvr 'virtual reality' display shows holographic projections

HP's 23.6-inch Zvr monitor can project 3D images, which users can navigate through, zoom and manipulate. READ MORE

iPhone dongle sends 100MB to other iOS devices in seconds

Toshiba's adapter uses Sony's TransferJet format and requires devices to be very close. READ MORE

WHITE PAPER: Onapsis Inc.

How to Identify SAP Security Weak Spots

Threats affecting the SAP application layer are frequently overlooked, leaving systems exposed to malicious attacks. This SAP Insider highlights the security blinds spots and explains how automated assessment and audit solutions enable organizations to monitor, detect, prioritize, and prevent threats to close security gaps and mitigate risks. Learn More

FOR INSIDERS ONLY

Get exclusive access to premium content from CIO magazine, Computerworld, InfoWorld, Network World, CSO, and ITworld -- the best publications in the business.

- 7 tips for landing a job at a coding competition (ITworld)

- 6 simple tricks for protecting your passwords (Network World)

- Free and cheap ways to learn about network administration (Computerworld)

- IT Resume Makeover: Top 11 tips from 2014 (CIO)

- How-to: Get started with Nginx (InfoWorld)

- Incident response survival guide (CSO)

What are you waiting for? Sign up today!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.