February 19, 2013
CONNECT WITH SMARTBRIEF LinkedInFacebookTwitterGoogle+
SmartBrief on ExecTech

The Game ChangerSponsored By
PLA unit is the source of massive Chinese hacking effort, report says
A U.S. computer security firm says it has identified the unit of the Chinese People's Liberation Army responsible for dozens of cyberattacks on U.S. companies over the years. In a 60-page report to be released today, Mandiant says it has overwhelming forensic evidence that attacks on U.S. firms such as Coca-Cola and, more recently, critical infrastructure industries, originated from the nondescript headquarters of PLA Unit 61398. The Chinese government denies responsibility for the attacks, but U.S. intelligence officials have said they have compiled evidence supporting Mandiant's findings. The New York Times (tiered subscription model) (2/18)
Managing Millennials: Engaging with the Newest Generation of Workers
Regardless of your industry, the population of millennials—employees who reached working age after 2000—is likely growing rapidly at your company. Read peer insight on recruiting and retaining this generation that has been described as both entitled and creative. Download Managing Millennials: Engaging with the Newest Generation of Workers.

Emerging Tools
China captures lead in global device race
Chinese consumers will own 246 million mobile devices by the end of the month, officially overtaking the U.S. as the world's leading market for emerging devices, data show. "China has over 1.3 billion people while the U.S. has just over 310 million. Considering that the U.S. has the world's third-largest population, the only other country that could feasibly overtake China sometime in the future is India, with a population of just over 1.2 billion," said Peter Farago, vice president of marketing at Flurry, which released the tally. CNET (2/18)
5 tips for managing negative online comments
The Internet gives your customers a voice online, but what can you do when that voice is yelling negative comments? With 5 tips, you can learn how to positively respond and help direct the conversation. Read the article and learn the 5 ways to respond positively.

Security UpdateSponsored By
Vodafone teams up with BAE Systems to boost mobile security
BAE Systems Detica and Vodafone will begin partnering on a cloud-based security system designed to protect mobile devices from intrusion, the companies announced. The system work by scanning inbound and outbound traffic, without affecting device performance, the firms say. Vodafone Mobile Threat Manager is the result of a five-year strategic agreement between the companies and will be deployed to 1,500 enterprise customers. Information-Age.com (2/18)
Building Workplace Trust 2015
Interaction Associates' 6th annual research study tracking trust on the job, Building Workplace Trust, is out, and more than half of employees surveyed give their organizations low marks for trust and leadership. Yet this year's findings again point to how high trust leads to better outcomes and financial results — and even boosts innovation.

Tech BusinessSponsored By
FCC: Broadband providers meet capacity promises
U.S. consumers can rely on the broadband speeds their service providers say they offer, according to a report from the Federal Communications Commission. The FCC survey found that broadband providers, on average, delivered speeds that were 97% of what was promised, compared with 87% in a 2011 report. CIO.com/IDG News Service (2/15)
Combating Identity Theft in a Mobile, Social World
Mobile connectivity threats extend from consumers to the business environment. But who is really responsible for securing sensitive information? Smart business leaders are becoming proactive on the matter. Learn how to get protected in this white paper. Download the white paper now.

Managing IT
Tips for the next-generation CIO
The chief information officer of tomorrow needs to be equal parts tech operative and business strategist; but tech leaders who have made the leap say the transition doesn't come without its challenges, and it requires less focus on how solutions work and more on why. The first step involves letting go of an impulse to micromanage daily operations and concentrate on the big picture, says CIO Tony Summers of East Sussex County Council. IT PRO (London) (2/12)
Don Quixote would have made a lousy innovator
Innovators hate the risk-averse culture of the modern workplace -- but taking a quixotic stand against corporate conservatism won't get you anywhere, writes Gijs van Wulfen. It's better to accept such resistance as a given and work around it, Van Wulfen writes. "Managing innovation has everything to do with managing expectations and reducing risks," he argues. InnovationManagement.se (Sweden) (2/14)
Geeking Out
Researchers turn to gene mapping to unlock secrets of malware
Computer scientists in New Zealand have developed a way to predict the threat level of strains of malware by leveraging the power of DNA mapping. The researchers -- who are from the School of Computing & Mathematical Sciences at Auckland University of Technology -- learned to circumvent limitations of data mining strings of malware code by representing them as amino acid and relying on established protein-modeling techniques to complete the analysis. V3.co.uk (U.K.)/The Frontline blog (2/18)
Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood."
-- Kevin Mandia, the founder and chief executive of security firm Mandiant, as quoted by The New York Times
Subscriber Tools
Please contact one of our specialists for advertising opportunities, editorial inquiries, job placements, or any other questions.
Lead Editor:  Jesse Stanchak
Contributing Editor:  Chris Moraff
Account Director:  Roger Leek
  M: 804.803.1414

Download the SmartBrief App  iTunes / Android
iTunes  Android
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2013 SmartBrief, Inc.®
Privacy policy |  Legal Information