Thursday, September 19, 2013

Snowden's role was 'perfect cover' for NSA data theft

  Hacking courses offer cybercrooks tips on how to hone skills | 7 biggest IT compliance headaches and how CIOs can cure them

 
  Computerworld First Look

Forward this to a Friend >>>


Snowden's role provided 'perfect cover' for NSA data theft
Fugitive document leaker Edward Snowden's role as a systems administrator provided easy access to classified NSA documents sitting in a file-sharing location on the spy agency's intranet portal. Read More
 


WHITE PAPER: Nexsan Technologies

The Five Forces Advancing Archive Center Stage
Big Data isn't over yet. How will you handle the ever-increasing amount of digital information? It's time to reconsider why archive may be the game-changing – and budget-saving – way to manage and secure your growing data. Storage analyst Jerome Wendt explains why it's time to rethink archive. Read now!

WEBCAST: Citrix Online

Detecting and Dealing with Toxic Teams
Join Paul Glen, CEO and author of Leading Geeks, on Thursday September 26 at 10AM PDT/ 1 PM EDT. as he explains the 5 warning signs that indicate you have a toxic team and how to restore your team to 100% health. Learn big solutions for big problems! View now

Hacking courses offer cybercrooks tips on how to hone skills
A growing number of experienced hackers have begun offering structured hacking courses for crooks seeking to make a career in cybercrime. Read More
 

7 biggest IT compliance headaches and how CIOs can cure them
IT, security and compliance experts discuss the biggest issues facing companies these days and what steps organizations can take to minimize potential regulatory compliance risks and security threats. Read More
 

Mars rover could have its own robotic snake
European researchers are working on a robotic explorer that won't get stuck in soft sand and can squeeze into tight places. Read More
 

JR Raphael: Moto X Developer Edition vs. the carrier models: Which should you get?
Motorola has announced a new developer edition of its well-received Moto X phone. So how does it compare to the carrier models, and which setup is right for you? Read More
 


WEBCAST: IBM Corporation
 
Proof that Smarter Government is also Better Government
This videocast on October 23 at noon ET will give you a rare opportunity to hear from your peers & IBM experts about the power of business analytics to make your budgeting and finance processes as fast, accurate and transparent as you need them to be. Learn More.

Amazon redesigns Kindle app for iOS 7, adds Collections
The Amazon Kindle for iOS update is optimized for iOS 7 and shares many of the flat design features central to Apple's latest mobile OS. Read More
 

AT&T, Microsoft team to link business customers to Azure cloud
AT&T is putting the finishing touches on a service that connects its corporate customers' VPNs to Microsoft Azure services, eliminating the need to find separate links between business sites and Microsoft's cloud. Read More
 

Darlene Storm: Not again: Stop blaming violent video games for mass shootings
Every time a mentally unstable person goes on a large-scale shooting spree, it only takes a few hours for some media outlets to dump the blame on violent video games. It's way past time to put a stop to spreading that rubbish. Millions upon millions of us are gamers and we don't go nuts and open fire in the real world. Read More
 

Linux kernel luminaries talk enterprise, embedded and why they're coming together
Developing the Linux kernel, according to some of the community's leading lights, is a difficult, complicated process but it's also one that's moving forward at some speed. Read More
 

Richi Jennings: HUGE BlackBerry layoffs: Up to 40% of staff say rumors
Thorsten issues BlackBerry PinkSlips. BlackBerry is said to be preparing yet more layoffs. And this time, it's a massive slash-fest: Up to 40% over three months, say the rumor-mongers. The news breaks just when BlackBerry really wants us to know about BBM on other platforms and focus on its latest phone, the Z30. In IT Blogwatch, bloggers ponder pathetically poor timing. Not to mention: ARRRR!.. Read More
 

 

DIGITAL SPOTLIGHT: SECURITY
 

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we run the numbers on BYOD, document cool new technologies making their way into the enterprise, and share tips from top companies on how to cope with exploding demand. This free, 12-page magazine-style report is available now [Registration required]

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still managed some surprises. What do you think the most important news from Apple's iPhone unveiling was?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:59 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive