| Wednesday, February 6, 2013 | | | | | | DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?
Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset. DOWNLOAD NOW FREE (Registration Required) | | REPORTS & WHITEPAPERS FEATURED REPORTS IT Pro Ranking: Unified Threat Management Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput. Download Now (Registration Required) | | Strategy: How to Conduct an Effective IT Security Risk Assessment Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment--and how to translate the results into terms that make sense in dollars. Download Now (Registration Required) | | | | | | | MOST POPULAR NEWS Samsung Galaxy S IV: What To Expect Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features. Anonymous Claims Wall Street Data Dump Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz. 10 Best Android Apps Of 2012 Check out these 10 gems that stood out from the crowd of 700,000 Android apps. Dell Goes Private: What's Next? Dell is going private with the help of $2 billion from Microsoft. Going forward, how much will Microsoft influence operations? 12 Best iPhone, iPad Apps Of 2012 You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two. MORE NEWS Mobile Security -- A Holistic Approach Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration | | | RESOURCES AND EVENTS 2013 InformationWeek 500: Nominations Now Accepted It's that time of the year again: Nominate your company for the 2013 InformationWeek 500 -- It's our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information. Deadline is April 12 | This e-mail was sent to sojo.blo@gmail.com | | | | Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of Global CIO go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. We take your privacy very seriously. Please review our Privacy Statement. | | | |
|
No comments:
Post a Comment