Reading this on a mobile device? Try our optimized mobile version here: http://r.smartbrief.com/resp/ebAOCfbwoceVknpVqmVS

December 10, 2012
Sign upForwardArchiveAdvertise
News for the IT Industry

  Today's Tech Buzz 
 
  • It's quality, not quantity, in Big Data analysis
    Quality analysis trumps poring over every available data stream when it comes to getting the most from Big Data, Steven Maxwell writes. Decreasing the time it takes to answer a business question is key to leveraging Big Data successfully in a marketplace that is already sick of the hype surrounding the trend, according to Maxwell. E-Commerce Times (12/8) LinkedInFacebookTwitterEmail this Story

Cybersecurity is a constant challenge. Organizations of all types need to ensure the confidentiality, integrity, and availability of data. Our programs and certificates will ensure you are able to keep up with the latest strategies and techniques— even as technology evolves. Our Information Assurance courses can be taken on-campus or completely online.
  Technology & Trends 
  • Hackers circumvent 2-step authentication using complex Trojan
    European hackers have stolen millions of dollars from online-banking customers using a sophisticated Trojan that infiltrates the two-step authentication process in mobile transactions. The bug, which primarily targets Android and BlackBerry devices, is delivered via a phishing e-mail or corrupt website and poses as a required "security upgrade" to trick banking customers into installing it on their phones. ZDNet (12/7) LinkedInFacebookTwitterEmail this Story
  • 7.1 exabytes of disk storage shipped in Q3, IDC finds
    Demand for multi-protocol storage pushed disk-storage shipments to more than 7 exabytes in the third quarter, a 24.4% spike compared with a year ago, according to the IDC Worldwide Quarterly Disk Storage Systems Tracker report. "End users continue to invest in storage infrastructures despite persistent concerns surrounding global and regional economies," IDC's Liz Conner said in a statement. Computerworld (12/7) LinkedInFacebookTwitterEmail this Story
  • Other News
FEATURED ARTICLE: 10 Small-Business Predictions for 2015
Things are looking up for small businesses in 2015. We count down the 10 ways you can get ahead in the New Year. Read the article.

  IT Channel 
 
  • EMC exec: IT should be headed toward services role
    EMC Chief Information Officer Sanjay Mirchandani predicts a sea change for the IT organization, from serving in a support function to acting as a services provider using a cloud-based delivery platform. "Cloud computing transforms us. ... We become more consultative as opposed to classic IT management," Mirchandani said. Computerworld (12/7) LinkedInFacebookTwitterEmail this Story
  • SAP deploys cloud-based tools for SMBs
    SAP says it has developed two cloud services aimed at helping small to midsized manufacturers. One tool is designed to help collect detailed data on what's in a product, while the other helps develop and generate regulatory-documentation materials. ChannelProSMB.com (12/10) LinkedInFacebookTwitterEmail this Story
  • Other News
Addressing Security Challenges with LTE
With more IP connectivity, more traffic, more bandwidth, more apps and new protocols like SIP and diameter, LTE provides new security challenges for mobile operators. Among the tools to deal with it are better leveraging of security policy and service chaining. Download F5's infographic for a snapshot of new LTE security challenges and how to address them.

  IT Workforce 
 
  • Give your employees the gift of leadership development
    The best bosses know when to step back and let their employees take the lead, writes Jennifer V. Miller. Leadership development shouldn't be reserved for people with a formal title, Miller explains. "When you provide your team members with an opportunity to exercise their leadership muscles, you're giving them a tremendous gift," she writes. SmartBrief/SmartBlog on Leadership (12/6) LinkedInFacebookTwitterEmail this Story
  • Other News
Combating Identity Theft in a Mobile, Social World
Mobile connectivity threats extend from consumers to the business environment. But who is really responsible for securing sensitive information? Smart business leaders are becoming proactive on the matter. Learn how to get protected in this white paper. Download the white paper now.

  Policy Watch 
  • Botnet taps Tor network for stealth attacks
    A botnet operator is taking advantage of an anonymity feature called Tor Hidden Services for distributed-denial-of-service attacks, Rapid7 says. "There is no technical way neither to trace and definitely neither to take down the Hidden Services used for [command and control]," Rapid7's Claudio Guarnieri says. Network World/IDG News Service (12/7) LinkedInFacebookTwitterEmail this Story
  CompTIA News 
  • Register for CompTIA's Annual Marketing Meeting
    CompTIA's Annual Member Meeting will be held March 12 and 13, 2013, at the Sheraton Chicago Hotel and Towers in Chicago. AMM brings CompTIA's member base together for two days of collaborative strategic planning and sharing amongst the association's most engaged members and community forums. Register today. LinkedInFacebookTwitterEmail this Story
  • Nominate for the IT Hall of Fame
    CompTIA's IT Hall of Fame recognizes IT channel game-changers and IT innovators who served as IT pioneers or uniquely helped the channel grow. Learn more here and nominate today. LinkedInFacebookTwitterEmail this Story
  • CompTIA IT SmartStat: Dec. 10, 2012
    75% of businesses say that risks associated with employees downloading unauthorized applications to mobile devices are a concern. CompTIA IT SmartStat LinkedInFacebookTwitterEmail this Story
 
Learn more about CompTIA ->About CompTIA  |  Donate  |  Programs and Initiatives
Events  |  Join CompTIA

  SmartQuote 
Alas for those that never sing, But die with all their music in them."
--Oliver Wendell Holmes Sr.,
American physician, writer and poet


LinkedInFacebookTwitterEmail this Story

 
 
Subscriber Tools
     
Print friendly format | Web version | Search past news | Archive | Privacy policy

Advertise
Account Director:  Roger Leek (804) 803-1414
 
Read more at SmartBrief.com
A powerful website for SmartBrief readers including:
 
 
 Recent CompTIA SmartBrief Issues:   Lead Editor:  Susan Rush
Contributing Editor:  Judy Mottl
   
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
 
 
© 1999-2012 SmartBrief, Inc.® Legal Information