Tuesday, June 25, 2013

Top Stories of the Day // June 25, 2013

TechCrunch


TechCrunch Disrupt SF returns Sept. 9-11 with an all new slate of outstanding startups and speakers including Marc Benioff, Jeff Weiner and Doug Leone. Get Extra Early Bird tickets while they last: Register Now!

Today's Top Stories // Jun 25, 2013

"Facebook Reader" Is Real, But It's Not RSS Or A Google Reader Wannabe

Facebook is working on a fresh way to read news, a source tells TechCrunch, and an image leaked to us by another might show the "Facebook Reader" in action.... read more

OUYA Gets Its Official Retail Release, But The $99 Game Console Still Hasn't Reached Every Early Backer

The Android-powered OUYA gaming console is celebrating its official first day of general retail availability today, a major milestone to be sure for the... read more

How Sony's SmartWatch 2 Stacks Up To The Pebble And The MetaWatch Strata

Sony's first go at the smartwatch mostly went unnoticed – a lot of people, myself included, had to be reminded of its existence when the Pebble made big waves... read more

Sony Supersizes Its Xperia Smartphone Line With 6.4" Full HD Xperia Z Ultra Phablet

read more

Rent The Runway Acquires Fashion-Focused Photo Sharing And Styling App Go Try It On

Rent The Runway, the Netflix for designer clothes, accessories and jewelry; has acquired Go Try It On, a startup that allows users to share photos of themselves... read more

A Year After Microsoft Bought It, Yammer Nears 8M Users, Deeper MSFT Integration... And Klout

One year to the day after Microsoft announced that it would acquire enterprise social networking tool Yammer for $1.2 billion, the pair are today publishing... read more

European Publishers, Others Slam Google On "Abusive" Practices, Ask EC To Reject Google Proposal

It looks like it may be back to the drawing board for Google on the European competitive front: hundreds of publishers and publishing trade associations today... read more

Biba Comes Out Of Stealth With $15M In Funding For Mobile-First, Password-Free Conferencing And Messaging Service

The smartphone is changing how people work but so far the applications for web conferencing have not taken much of a mobile-first approach. Biba, a new company... read more

Barnes & Noble Reports $118.6M Loss On Revenue Of $1.3B In Q4, Plans To Open Nook Brand To Tablet OEMs

Barnes & Noble reported its fiscal fourth quarter earnings this morning, and the financials make it clear that the company is still struggling to figure out... read more

Online Book Publishing Platform 7write Raises $250,000 Seed Round From Early PayPal Investor, Others

It's not too often that a startup from 'down under' up roots to join an accelerator in Europe and then gets funded before graduating. Enter online book... read more

To forward this newsletter to a friend, click here.

TechCrunch

0-Day The (Bug) Bounty Hunter | Managing Mobile Security | Improving Web Application Security

If you have trouble viewing this email, read the online version.

masthead
June 25, 2013
Follow us:    
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>

0-Day The (Bug) Bounty Hunter
Companies increasingly offer bug bounties to help find vulnerabilities and threats. This is an opportunity for those looking to get into security.



Read More



 
 More Resources
3 Guiding Principles to Improve Data Security and Compliance
Get a deeper understanding of the complex data security and privacy threat landscape, compliance and regulatory requirements, and how to apply a holistic approach to ensure the protection and integrity of your data.

Don't Wait Until it's Too Late: Choose Next-Gen Backup to Protect Your Business From Disaster
Whether via the cloud or a hybrid option, SMBs need a plan to protect their data. Learn about comprehensive disaster recovery for SMBs.

Know the Big Three
The rapid embrace of mobile computing has seen security concerns outpaced by the ease of use, flexibility, and productivity. Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.



Security

Managing Mobile Security in Small and Midsize Businesses Sponsored by Symantec
When it comes to mobile security, some concerns are common across all organizations. One of the biggest is the surge in the use of personal devices for business purposes - otherwise known as BYOD. However, the challenges for SMBs are heightened because these organizations often lack resources and expertise. In this Dark Reading report, we examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems.

How Attackers Choose Which Vulnerabilities To Exploit Sponsored by Lumension
In the increasingly complex world of information security, it's important for security professionals to be able to understand not only how their organization's systems and data may be compromised but why. In this Dark Reading report we examine why certain vulnerabilities are exploited, by whom and with what. We also provide recommendations for getting out in front of hackers by using some of the same tools and strategies they do.

Building & Maintaining Database Access Control Provisions Sponsored by IBM
Knotted and complex database access permissions are among the biggest threats to enterprise data security. In this Dark Reading report, we examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations thoughtfully and effectively grant privilege when and where it is needed - and only when and where it is needed.

5 Ways To Better Hunt The Zebras In Your Network Sponsored by HP
This issue of InformationWeek's Must Reads explores ways to protect vulnerable users in your company, lessons learned from the Evernote breach, how the FBI is improving enterprise insider theft detection and more.

Strategies for Improving Web Application Security Sponsored by Imperva
Web applications are fraught with risk, but for most companies, not having them is not an option. They're just too important to customers and to the business. In this Dark Reading report, we recommend some best practices for balancing the needs of the business with security requirements. It doesn't take special certification or a million dollars, but it does take planning, time, and a smart combination of tools and best practices.

Network Monitoring As a Security Too Sponsored by IBM
The use of network monitoring tools in a security context can help companies fill gaps in protection as well as identify potential problems. Used strategically, network monitoring tools may help enterprises to detect potential security problems that they might otherwise have missed -- while also helping security organizations justify additional investment.

Building & Enforcing an Endpoint Security Strategy Sponsored by Symantec
In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? In this Dark Reading report, we examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.

Network Infrastructure

5 SDN Business Benefits Sponsored by NEC
Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that's poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits.

InformationWeek Reports is brought to you by HP, IBM, Imperva, Lumension, NEC, Symantec and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy