2015년 3월 11일 수요일

Why Israel could be the next cybersecurity world power

ITworld
ITworld Today
March 11, 2015

Why Israel could be the next cybersecurity world power

A well established university program, major industry partners, sponsored research projects and a venture capital partner give a dusty desert town in the south of Israel the makings for becoming a major cybersecurity player. READ MORE
 

Issue highlights

WHITE PAPER: Rackspace

Do You Know Who is Running Your Cloud?

Choosing a partner with deep cloud expertise, a track record of leadership, an understanding of your industry, and insight into your business' unique requirements is the clear path for migrating your operations into a scalable, highly available cloud solution. LEARN MORE

Survey: Trust in Public Key encryption near breaking point

IT professionals are more reliant on public key encryption than ever before. They’re also more doubtful than ever before that the technology will keep their critical data and assets safe, according to a Ponemon survey of more than 2,000 IT pros. READ MORE

Snowden docs show CIA's attempts to defeat Apple device security

A secret CIA-sponsored conference reportedly hosted talks on stealing encryption keys from Apple devices and infecting them with malware. READ MORE

Interest in F# trending (slowly) upwards

The open source functional language created by Microsoft is showing some signs of becoming more popular among developers. READ MORE

Man claiming half ownership of Facebook is now a fugitive

Paul D. Ceglia was arrested in 2012 for allegedly defrauding Facebook. READ MORE

Blue Coat Systems gets flipped for $2.4 billion

Security vendor Blue Coat Systems being sold by one private equity firm to another as it is prepped to go public again. READ MORE
WHITE PAPER: CDW

5 Things Your Organization Can Do to Improve Security

One of the great things about being on the security assessment team is the ability to work with companies to truly improve their overall security posture. Sure, it's interesting to talk about zero-days and exotic exploits against systems they don't have, but in most cases, it doesn't hold particular relevance. VIEW NOW

Google's Angular 2 being built with Microsoft's TypeScript

Google adopting Microsoft's TypeScript language for its upcoming version of Angular is a big win for the platform. READ MORE

Sony pulls the plug on PlayStation Mobile platform

The platform featured games from indie developers as well as PS classics. READ MORE

IBM expands IaaS cloud services to include OpenPower servers

Program expands the bare metal offerings from just x86 to its RISC line of servers. READ MORE

Six things to know about the USB 3.1 port in the new MacBook

The new port in the 12-inch MacBook is backward compatible with USB 3.0 and USB 2.0. READ MORE

WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE
WEBCAST: CDW

Achieving Complete Security: Endpoint, Mobile, and NAC

Is sensitive data leaking out of your business? For many enterprises, mobility is the enemy of security. As more devices and platforms enter the workplace, security strategy must be constantly refined to ensure the safety of data and users. VIEW NOW
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기