Tuesday, June 18, 2013

Top Stories of the Day // June 18, 2013

TechCrunch


The countdown is on: 2 days left to apply for Startup Battlefield at TechCrunch Disrupt SF. Applications are due Wednesday June 19 so go here for more info and apply now!

Today's Top Stories // Jun 18, 2013

Fear And Loathing Of Silicon Valley

Welcome to the Summer of 2013. Welcome to the summer when you're not quite sure which of your Internet activities are being tracked. When you want to start... read more

Why Was Apple Late To The PRISM Party?

If there's one striking thing about those PRISM slides, other than their hideous aesthetics, it's that Apple's allocated yellow oval, instead of a date, has the... read more

Tesla Battery Swapping Tech For Long Trips Without Charging Stops To Be Demoed June 20

Elon Musk took to Twitter early this morning (via Verge) to promote an event coming this Thursday that promises to show off new tech that allows quick swapping... read more

If You Watch One Daft Punk Remix Performed By Robots (And Jack Conte) Today, Make It This One

Jack Conte, musician and founder of Patreon, has been on a tear lately with a set of unique music remixes performed by him and a group of pneumatic robots that... read more

Worried Who's Watching Your Web Browsing? Adafruit's Onion Pi Tor Proxy Project Creates A Private, Portable Wi-Fi Access Point

Adafruit Industries has put together a weekend project for people worried the NSA is monitoring how many reruns of Seinfeld they watch on their tablet. The... read more

FiftyThree, Maker Of Drawing App Paper, Raises $15 Million From Andreessen Horowitz And Others

FiftyThree, the startup behind the wildly popular drawing app Paper, has closed a Series A round of financing from Andreessen Horowitz, we've learned. The... read more

Goji Is A Smart Lock For Your Home That Has Nothing To Do With Berries

Welcome to the era of the round, shiny in-home automation system. While Nest led the charge early on, a new device, called Goji, is taking up the mantle. The... read more

The Mini HTC One Will Be Called The HTC One Mini

There's plenty of information swirling about the HTC One Mini thus far, especially considering it's not an officially announced handset by any means. Still,... read more

Yahoo! Reportedly Offers $30M to $40M For Social Email Startup Xobni

Yahoo is offering to purchase social email startup Xobni for $30 million to $40 million, according to AllThingsD's sources. If the deal goes through, Xobni... read more

Ad Giant WPP Leads $4.4M Round In Muzy, A Mobile Microblogging Startup With 20M Users

Advertising giant WPP is taking another step into the world of startup investments, this time specifically in mobile and social media. WPP Ventures, a new... read more

To forward this newsletter to a friend, click here.

TechCrunch

Endpoint Protection: Tablet Trouble | Security Implications Of Big Data | E-Discovery, Mobility & the Cloud

If you have trouble viewing this email, read the online version.

InformationWeek Analytics Newsletter
masthead
June 18, 2013
Follow us:   
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>

Endpoint Data Protection: Tablet Trouble
Backup managers should look at bringing endpoint protection in-house and using it to protect tablets.
Read More

Bad SSH Key Management Leaves Databases At Risk
Not enough oversight of keys leaves SSH clients open to abuse


Read More



 
 More Resources
Steps to Take Before Choosing a Business Continuity Partner
This Aberdeen Analyst report details the necessities in creating business continuity plans & if there's the need to outsource part/all of the process.

Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.

2013 Gartner Magic Quadrant for SIEM
IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements.

10 Things to Look for in a SDN Controller
Noted industry expert, Dr. Jim Metzler provides insight on the key elements to consider in an SDN controller, bringing clarity to SDN decisions and giving an insider's perspective on what is truly possible with this emerging technology.



Security

5 Security Tools Every Small Business Must Have Sponsored by Symantec
SMBs may not have the IT resources that their bigger peers do, but they do have the same responsibilities when it comes to security. Fortunately, SMBs can build a strong security posture using a few key products, many of which are free. In this report, Dark Reading examines the challenges that SMBs face when it comes to security and recommends the five security tools every SMB must have.

Security Implications Of Big Data Strategies Sponsored by IBM
To understand how to secure big data, you have to understand what it is - and what it isn't. As organizations set about building big data clusters, they're finding that many of the best practices for securing such clusters are the same used to secure any corporate data. However, there are some big differences as well. Here are some recommendations on how to alter your security strategy to accommodate big data - and when not to.

A Guide to Network Vulnerability Sponsored by Lumension
Building a more robust network vulnerability management program can help you identify security holes before an attacker does, as well as develop more secure systems and applications in the future. In this Dark Reading report, we examine the products and practices that will get you there.

Security

Enterprise Defenses With Threat Intelligence Sponsored by IBM
The value of threat intelligence is based on organization-specific factors, including how threat intelligence is defined, the data the organization evaluates, the maturity of the shop in question and the use cases for the data. In this Dark Reading report, we examine how a combination of threat intelligence and security monitoring can boost enterprise defenses, and recommend how to determine if your organization is ready to tap into the model.

10 Emerging Threats Your Company May Not Know About Sponsored by HP
The devil you know is better than the one you don't. Never was that adage more true than in today's complex, ever-changing computing landscape. In this Dark Reading report, we examine 10 emerging threats that you should have on your radar now.

Insecurity with Java Sponsored by Imperva
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

Applications Monitoring For Security Professionals Sponsored by IBM
When it comes to monitoring, the application space is often forgotten. The inherent variability of applications can make monitoring a challenge, but enterprises can extend existing tools to include the applications space. In this report, we make the case for the development of an applications monitoring strategy and provide recommendations for implementation that tap into existing products and processes.

2013 Wireless LAN Survey Sponsored by Symantec
Given the cost of cellular access, the multiplying number of mobile devices and the imminent ratification of the superfast 802.11ac specification, we decided to survey InformationWeek readers about their wireless LANs today and plans for the future. Among the 419 respondents to our InformationWeek 2013 Wireless LAN Survey, 89% use 802.11n technologies as a network access method for end users, up from 76% in September 2010.

InformationWeek Reports is brought to you by Asigra, HP, IBM, Imperva, Lumension, NEC, Symantec and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy