Thursday, February 21, 2013

China Hacking Accusations: 6 Facts | New Strategy For Protecting Trade Secrets

If you have trouble viewing this email, read the online version.

InformationWeek Government
Join the community
Facebook Twitter LinkedIn
  Thursday, February 21, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist China Denies U.S. Hacking Accusations: 6 Facts
By Mathew J. Schwartz
Mandiant report says that an elite Chinese military hacking unit is responsible for launching APT attacks against U.S. businesses. Chinese government cries foul.

U.S. Trade Secret Strategy Targets Hackers
Amidst new reports of theft of intellectual property by Chinese hackers, the White House on Wednesday released a new strategy to fight trade secret theft.

Feds Roll Out Social Media Metrics, API
New metrics will help agencies assess their social media performance, while API will let news organizations pull real-time data from FEMA and other agencies.

FAA Drone Plan Hits Turbulence
Technology and policy issues emerge as the FAA devises a five-year road map to integrate unmanned aerial vehicles (UAVs) with commercial flights in U.S. airspace.

U.K. 4G Auction Nets Underwhelming £2.34 Sale Price
Sale is a third less than cash-strapped government expected, but increase in 4G services will help build a base for future digital industries, say pleased business groups.

U.K. Government Cloud Ambitions Bigger Than Achievements, Critics Say
A year after it launched an easy to use, SMB-vendor friendly buying site, critics question what they see as very patchy U.K. government CloudStore success.

  Digital Issue  
DOWNLOAD INFORMATIONWEEK HEALTHCARE'S DIGITAL ISSUE
In our new, all-digital 'Big Data Analytics' issue:
As large healthcare providers test the limits, many smaller groups question the value.

ALSO: Ask these six questions about natural language processing before you buy.


DOWNLOAD NOW FREE (Registration Required)
 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: Security Staffing Survey
Hiring the wrong security pro can be a costly mistake that could set your company back years in terms of risk reduction. But finding the right person isn't easy. But don't despair. We'll walk you through the steps you need to take to find the best security professionals.
Download Now (Registration Required)

Featured Report
Strategy: Building and Maintaining Database Access Control Permissions
Knotted and complex database access permissions are among the biggest threats to enterprise data security. In this Dark Reading report, we examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations thoughtfully and effectively grant privilege when and where it is needed -- and only when and where it is needed.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Accelerate Growth via Smarter Public Safety Management
Many public safety agencies need to do more with less and link spending to outcomes. The global trends highlighted in this report show the increasing challenges and issues confronting public safety agencies.
Download Now (Registration Required)


Crime Prediction and Prevention: A safer public through advanced analytics
Crime prediction and prevention analytics from IBM helps agencies make the best use of the people and information at hand to monitor, measure and predict crime and crime trends. Analysis of police data provides insight that lets officers track criminal activities, predict the likelihood of incidents,effectively deploy resources and solve cases faster.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Apple iWatch Vs. Smartwatches Past And Present
iWatch could change the mobile landscape, or it could end up as a redundant peripheral. Can Apple avoid the smartwatch flops of the past?

HTC One Can Compete With Apple, Samsung
HTC One offers world-class hardware, slick software enhancements and a really cool camera.

Google Seeks Glass Explorers
Anyone interested in buying Google's forthcoming computerized eyewear can post or tweet in hope of receiving an invitation.

Oracle, Apple Issue Java Security Patches
Oracle updates Java 7 and issues the final-ever public update for Java 6, while Apple releases its own Java 6 update for OS X users.





MORE NEWS  
 
WEBCASTS
Secure Access: Next Steps In Identity Management
Identity management and credential technologies in government environments aim to provide fast and secure access to information, systems, and physical locations. In this interactive editorial webcast on Thursday, February 21, 2013, we will provide an update on the Federal Identity, Credential, and Access Management initiative, the National Strategy for Trusted Identities in Cyberspace, and other programs, and on agency efforts to meet those objectives. More Information & Registration

--------------------------------------------------------------------
This issue is sponsored by Zebra Technologies

--------------------------------------------------------------------
 
RESOURCES AND EVENTS
2013 InformationWeek Government IT Innovators
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes?
Nominate By April 12



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Government
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of the InformationWeek Government Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment