Tuesday, July 30, 2013

Top Stories of the Day // July 30, 2013

TechCrunch

Disrupt SF returns Sept. 9-11 with an all new slate of outstanding startups and influential speakers including Dick Costolo and Marissa Mayer. Early Bird tickets are available until August 19: register today and save $1,000!
Today's Top Stories // Jul 30, 2013

Crowdfunding Reaches Its Terrible, Glorious Climax With 'Smart Vibrator' Vibease

The startup behind a "wearable smart vibrator" called Vibease has taken to Indiegogo with hopes of raising at least $30,000 from fans.... read more

Forrester Says The Chromebook's Time Has Arrived In The Enterprise, But Security Is The Nagging Issue

IT should ignore the naysayers and consider adopting the Google Chromebook. That's the conclusion of a Forrester Research Report that looked at the future of... read more

Hilary Mason Leaves Bitly To Join VC Firm Accel As Its First Data Scientist In Residence

Accel Partners is announcing a major talent win tonight, with the addition of former Bitly chief scientist Hilary Mason as its first data scientist in... read more

HTC's Hardship Continues As It Predicts Operating Loss In Q3

No surprise: HTC's run of declining quarters is predicted to continue. But the dip now looks set to push into the red in Q3. The Android mobile maker has just... read more

Vaavud Smartphone Wind Meter Now Available, Use Your Phone To Measure Windspeed Like It's The Future

Kickstarter success Vaavud is a thing of beauty. Created by a Danish team of enterprising inventors, it plugs into your iPhone or Android device's headphone... read more

Netflix User Profiles Start Appearing On Apple TV

The long-awaited Netflix user profiles have made their first appearance, ahead of their expected August debut. According to several reports, user profiles are... read more

Grid, An App That Helps You Organize Ideas And Projects, Announces A Seed Round From Jerry Yang, Phil Libin, Others

Grid Grid, an "Excel minus the equations" app that helps you plan and organize more effectively and beautifully, announced today that it has raised a seed... read more

Zynga Sheds Three Top Execs As Its New CEO Shakes Up The Troubled Gaming Firm

In the last month, Zynga has quietly parted ways with three of its executive staff, early changes under the period of transition that the company's new CEO,... read more

Apple Patents Triple Sensor, Triple Lens iPhone Camera For Better Resolution And Color Accuracy

Apple has been granted a new patent related to camera tech by the USPTO today, which uses three different sensors and three different lenses to improve color... read more

Facebook Announces New Mobile Game Publishing Effort

read more

Read more at techcrunch.com


CRUNCHGOV DAILY ROUNDUP

Why Labor Unions And Silicon Valley Aren’t Friends, In 2 Charts

None of the Internet giants have unionized employees, which has made Silicon Valley a favorite target for civil libertarians. Earlier this month, after… read more

Read more at techcrunch.com/crunchgov/

To forward this newsletter to a friend, click here.

TechCrunch

2013 IT Spending Priorities | File-Level Data Protection | Trends In Mobile Device Threats

If you have trouble viewing this email, read the online version.

masthead
July 30, 2013
Follow us:    
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>

Surrendering The Endpoint

Imagine there's no desktop. What if you had to design all of your security and monitoring around the fact that it's not your endpoint any more, and it will never be your endpoint again?
Read More


Moving Beyond the Ring and a Load of Wax: Identity in the 21st Century

Today I want to take a closer look at identity. Most people will tell you things are pretty bad today, but things have improved quite a lot.

Read More



 
 More Resources
Hybrid IT Service Management: A Requirement for Virtualization and Cloud Computing
While many IT organizations are excited about the prospects of cloud-based and virtual computing, cloud is a means to improved efficiency. Learn how you can capitalize on your hard work in domain management, service management and virtualization to leverage cloud services for increased resiliency and efficiency.

Hacker Intelligence Summary Report: The Anatomy of a Hacktivist Attack
Imperva witnessed a recent hacktivist attack that lasted for 25 days. Our observations give insight into hacktivist attack methods and an examination of how social media enables recruitment and attack coordination. Understanding how hacktivists operate will help organizations prepare for a future attack.

Law Enforcement & Cellular Networks Combat Smartphone Theft
Increasing theft of smartphone devices is putting their owners at risk. Find out how law enforcement agencies and cellular networks are working to combat smartphone theft through checking and blocking IMEI numbers, and the direction theft prevention is taking.



SECURITY

Tools and Strategies for File-Level Data Protection - Sponsored by Imperva
There is nothing in the enterprise that warrants protection more than data, but security pros all too often focus more on perimeter security. This may be because it can be more challenging to secure data, but once data is locked down, any compromises to the networks and servers that transport and house it almost don't matter. In this Dark Reading report we recommend several ways that security pros can effectively ensure that data is kept from prying eyes.

Trends In Mobile Device Threats - Sponsored by Trusteer
While there's some debate about the level of threat mobile devices pose, there's no question that the threat is growing. With readily available information about the devices in use, and often few corporate safeguards in place, mobile devices are turning out to be a lucrative vector for attackers looking for an in to enterprise networks. In this Dark Reading report, we explain how the threat is growing, what attackers are targeting and why you need to be concerned.

Stop Mobile Device-Borne Malware - Sponsored by Absolute Software
iPhones, iPads and Android devices are making their way into your company--like it or not. These devices are opening a new gateway for malware that old security tools and procedures can't completely close. Security professionals must combine education, policy development, and the use of existing tools and new mobile device management systems to effectively balance mobile device risk with productivity rewards.

IT AS A SERVICE

2013 IT Spending Priorities Survey - Sponsored by FrontRange
When IT is seen as just a cost center, the business loses. Yet many CIOs are barely keeping their budgets flat; some must even absorb cuts. It's hard to innovate when you're scraping to pay for basic security. In this report, we examine the fallout when IT is reduced to just "keeping the lights on," and discuss ways to break the cycle.

InformationWeek Reports is brought to you by Absolute Software, Asigra, FrontRange, Imperva, Trusteer and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy