February 19, 2013
CONNECT WITH SMARTBRIEF LinkedInFacebookTwitterGoogle+
SmartBrief on ExecTech
SIGN UP|FORWARD|ARCHIVE|ADVERTISE

The Game ChangerSponsored By
PLA unit is the source of massive Chinese hacking effort, report says
A U.S. computer security firm says it has identified the unit of the Chinese People's Liberation Army responsible for dozens of cyberattacks on U.S. companies over the years. In a 60-page report to be released today, Mandiant says it has overwhelming forensic evidence that attacks on U.S. firms such as Coca-Cola and, more recently, critical infrastructure industries, originated from the nondescript headquarters of PLA Unit 61398. The Chinese government denies responsibility for the attacks, but U.S. intelligence officials have said they have compiled evidence supporting Mandiant's findings. The New York Times (tiered subscription model) (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
Online Computer Science M.S. – Syracuse University
The 100% online M.S. in Computer Science is designed to combine computer science theory with a focus on complex mathematics, delivering a relevant and application-based education. The curriculum emphasizes emerging technology and new system designs. Top ranked by U.S. News.
Learn More

Emerging ToolsSponsored By
China captures lead in global device race
Chinese consumers will own 246 million mobile devices by the end of the month, officially overtaking the U.S. as the world's leading market for emerging devices, data show. "China has over 1.3 billion people while the U.S. has just over 310 million. Considering that the U.S. has the world's third-largest population, the only other country that could feasibly overtake China sometime in the future is India, with a population of just over 1.2 billion," said Peter Farago, vice president of marketing at Flurry, which released the tally. CNET (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
Tame the Digital Marketing Beast
Learn how Tealium iQ, a leading tag management solution, helps tame the digital marketing beast by establishing a unified data layer and providing turnkey access to more than 700 digital vendors. Easily deploy and manage tags from within the Tealium iQ console. Free Guidebook

Security UpdateSponsored By
Vodafone teams up with BAE Systems to boost mobile security
BAE Systems Detica and Vodafone will begin partnering on a cloud-based security system designed to protect mobile devices from intrusion, the companies announced. The system work by scanning inbound and outbound traffic, without affecting device performance, the firms say. Vodafone Mobile Threat Manager is the result of a five-year strategic agreement between the companies and will be deployed to 1,500 enterprise customers. Information-Age.com (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
Combating Identity Theft in a Mobile, Social World
Mobile connectivity threats extend from consumers to the business environment. But who is really responsible for securing sensitive information? Smart business leaders are becoming proactive on the matter. Learn how to get protected in this white paper. Download the white paper now.

Tech BusinessSponsored By
FCC: Broadband providers meet capacity promises
U.S. consumers can rely on the broadband speeds their service providers say they offer, according to a report from the Federal Communications Commission. The FCC survey found that broadband providers, on average, delivered speeds that were 97% of what was promised, compared with 87% in a 2011 report. CIO.com/IDG News Service (2/15)
Share:LinkedInTwitterFacebookGoogle+Email
The ROI of Privacy with TRUSTe Solutions
Investment in a Data Privacy Management Platform can deliver significant, positive financial returns for corporate bottom lines. The "Total Economic Impact (TEI) of TRUSTe" Study explains how Forrester Analysts calculated a 151% ROI for TRUSTe customers. Download the study now.

Managing IT
Tips for the next-generation CIO
The chief information officer of tomorrow needs to be equal parts tech operative and business strategist; but tech leaders who have made the leap say the transition doesn't come without its challenges, and it requires less focus on how solutions work and more on why. The first step involves letting go of an impulse to micromanage daily operations and concentrate on the big picture, says CIO Tony Summers of East Sussex County Council. IT PRO (London) (2/12)
Share:LinkedInTwitterFacebookGoogle+Email
Don Quixote would have made a lousy innovator
Innovators hate the risk-averse culture of the modern workplace -- but taking a quixotic stand against corporate conservatism won't get you anywhere, writes Gijs van Wulfen. It's better to accept such resistance as a given and work around it, Van Wulfen writes. "Managing innovation has everything to do with managing expectations and reducing risks," he argues. InnovationManagement.se (Sweden) (2/14)
Share:LinkedInTwitterFacebookGoogle+Email
Geeking Out
Researchers turn to gene mapping to unlock secrets of malware
Computer scientists in New Zealand have developed a way to predict the threat level of strains of malware by leveraging the power of DNA mapping. The researchers -- who are from the School of Computing & Mathematical Sciences at Auckland University of Technology -- learned to circumvent limitations of data mining strings of malware code by representing them as amino acid and relying on established protein-modeling techniques to complete the analysis. V3.co.uk (U.K.)/The Frontline blog (2/18)
Share:LinkedInTwitterFacebookGoogle+Email
SmartQuote
Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood."
-- Kevin Mandia, the founder and chief executive of security firm Mandiant, as quoted by The New York Times
Share:LinkedInTwitterFacebookGoogle+Email
Subscriber Tools
Please contact one of our specialists for advertising opportunities, editorial inquiries, job placements, or any other questions.
 
Lead Editor:  Jesse Stanchak
Contributing Editor:  Chris Moraff
Account Director:  Roger Leek
  M: 804.803.1414
 
 

Download the SmartBrief App  iTunes / Android
iTunes  Android
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.®
Privacy policy |  Legal Information