February 19, 2013
CONNECT WITH SMARTBRIEF LinkedInFacebookTwitterGoogle+
SmartBrief on ExecTech

The Game ChangerSponsored By
PLA unit is the source of massive Chinese hacking effort, report says
A U.S. computer security firm says it has identified the unit of the Chinese People's Liberation Army responsible for dozens of cyberattacks on U.S. companies over the years. In a 60-page report to be released today, Mandiant says it has overwhelming forensic evidence that attacks on U.S. firms such as Coca-Cola and, more recently, critical infrastructure industries, originated from the nondescript headquarters of PLA Unit 61398. The Chinese government denies responsibility for the attacks, but U.S. intelligence officials have said they have compiled evidence supporting Mandiant's findings. The New York Times (tiered subscription model) (2/18)
Register for a chance to win four tickets to Daytona Beach
Win a VIP experience in Daytona Beach when FedEx is your freight shipping pit crew. Register at fedex.com/freightsweeps.

Emerging ToolsSponsored By
China captures lead in global device race
Chinese consumers will own 246 million mobile devices by the end of the month, officially overtaking the U.S. as the world's leading market for emerging devices, data show. "China has over 1.3 billion people while the U.S. has just over 310 million. Considering that the U.S. has the world's third-largest population, the only other country that could feasibly overtake China sometime in the future is India, with a population of just over 1.2 billion," said Peter Farago, vice president of marketing at Flurry, which released the tally. CNET (2/18)
Gain advanced hands-on instruction in engineering secure software and systems to tackle today's biggest cybersecurity threats. An online master of science in cybersecurity from the University of Delaware takes you beyond traditional IT, balancing technical fundamentals and the latest practices to protect global systems and infrastructure. LEARN MORE.

Security UpdateSponsored By
Vodafone teams up with BAE Systems to boost mobile security
BAE Systems Detica and Vodafone will begin partnering on a cloud-based security system designed to protect mobile devices from intrusion, the companies announced. The system work by scanning inbound and outbound traffic, without affecting device performance, the firms say. Vodafone Mobile Threat Manager is the result of a five-year strategic agreement between the companies and will be deployed to 1,500 enterprise customers. Information-Age.com (2/18)
Ten Essentials for Securing LTE Networks
Service providers must choose high-throughput, right-featured, and flexible security solutions to ensure a competitive advantage. Only then can they build out their networks to take advantage of the growth opportunities. Download the whitepaper to understand the security capabilities to be considered to implement carrier-class network firewalls.

Tech BusinessSponsored By
FCC: Broadband providers meet capacity promises
U.S. consumers can rely on the broadband speeds their service providers say they offer, according to a report from the Federal Communications Commission. The FCC survey found that broadband providers, on average, delivered speeds that were 97% of what was promised, compared with 87% in a 2011 report. CIO.com/IDG News Service (2/15)
Blend Content and Community to Create Truly Interactive Websites
Websites need to evolve. Visit any website today and they're much the same as those in the 1990's: entirely one-way. In this eBook, we detail six reasons for blending an online community to make your website interactive.

Managing IT
Tips for the next-generation CIO
The chief information officer of tomorrow needs to be equal parts tech operative and business strategist; but tech leaders who have made the leap say the transition doesn't come without its challenges, and it requires less focus on how solutions work and more on why. The first step involves letting go of an impulse to micromanage daily operations and concentrate on the big picture, says CIO Tony Summers of East Sussex County Council. IT PRO (London) (2/12)
Don Quixote would have made a lousy innovator
Innovators hate the risk-averse culture of the modern workplace -- but taking a quixotic stand against corporate conservatism won't get you anywhere, writes Gijs van Wulfen. It's better to accept such resistance as a given and work around it, Van Wulfen writes. "Managing innovation has everything to do with managing expectations and reducing risks," he argues. InnovationManagement.se (Sweden) (2/14)
Geeking Out
Researchers turn to gene mapping to unlock secrets of malware
Computer scientists in New Zealand have developed a way to predict the threat level of strains of malware by leveraging the power of DNA mapping. The researchers -- who are from the School of Computing & Mathematical Sciences at Auckland University of Technology -- learned to circumvent limitations of data mining strings of malware code by representing them as amino acid and relying on established protein-modeling techniques to complete the analysis. V3.co.uk (U.K.)/The Frontline blog (2/18)
Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood."
-- Kevin Mandia, the founder and chief executive of security firm Mandiant, as quoted by The New York Times
Subscriber Tools
Please contact one of our specialists for advertising opportunities, editorial inquiries, job placements, or any other questions.
Lead Editor:  Jesse Stanchak
Contributing Editor:  Chris Moraff
Account Director:  Roger Leek
  M: 804.803.1414

Download the SmartBrief App  iTunes / Android
iTunes  Android
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.®
Privacy policy |  Legal Information