Search This Blog

Wednesday, August 05, 2015

How to reduce IT complexity and increase agility

Computerworld First Look
August 05, 2015

How to reduce IT complexity and increase agility

Overlapping, outdated systems cost money, hobble innovation and confuse employees and customers. How to tackle the tangle? Five execs share strategies for simplifying your tech stack. READ MORE

Twitter
 

Issue highlights

1. China to plant Internet police in top online firms

2. Microsoft levels up web version of Outlook for business customers

3. INSIDER Why every CIO needs a cybersecurity attorney

4. IDG Contributor Network: Microsoft responds to Windows 10 privacy policy concerns

5. GE launches cloud for the industrial Internet

6. 8 most in-demand IT security certifications

7. INSIDER FREE COURSE: Hack yourself first (before the bad guys do)

8. Salesforce taps Instagram's new API with tailored marketing tools

9. Who goes there? CA will know with Xceedium buy

10. IT Blogwatch: Here's why Apple won't run its own cellular service (unless it will)

White Paper: Imperva

10 Things Every Web Application Firewall Should Provide

Securing web applications against external threats is a never-ending effort. Web application firewalls have become the central platform for protecting applications against all online threats. This white paper explains in detail the 10 features that every web application firewall should provide. Read now!

China to plant Internet police in top online firms

In a bid to better police local websites, China's security forces are establishing offices at the biggest online companies in the country. READ MORE

Microsoft levels up web version of Outlook for business customers

Enterprise users who rely on the web interface for Microsoft Outlook email will be getting an upgrade with new features Microsoft announced Tuesday. READ MORE

INSIDER

Why every CIO needs a cybersecurity attorney

Distinguishing the technical experts from those responsible for legal obligations and risks will help companies develop better breach response plans. Understanding the role of an external cybersecurity firm will only help. READ MORE

IDG Contributor Network: Microsoft responds to Windows 10 privacy policy concerns

Official statements are right here if you want to read them. READ MORE

GE launches cloud for the industrial Internet

General Electric is pitching a cloud service for the Internet of Things market, but its focus is primarily on heavy industries like aviation, healthcare, energy and transportation. READ MORE

White Paper: Imperva

The Cloud App Visibility Blindspot

This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of "Shadow IT". In addition, this paper covers why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use. Learn more.

8 most in-demand IT security certifications

High-profile security breaches, such as the July hack of Ashley Madison, have highlighted the need for skilled security professionals. The most recent IT Skills and Certifications Pay Index from research and analysis firm Foote Partners confirms that IT pros holding security certifications can expect premium pay. READ MORE

INSIDER

FREE COURSE: Hack yourself first (before the bad guys do)

In partnership with tech training provider Pluralsight, Computerworld offers a free online course. Learn how to think like a hacker, and use some of the tools they do, to find the security holes in your websites before a breach occurs. (Insider - free registration required.) READ MORE

Salesforce taps Instagram's new API with tailored marketing tools

Marketing Cloud users now have easier access to Instagram's 300 million users. READ MORE

Who goes there? CA will know with Xceedium buy

In a move to round out its portfolio of enterprise identity management software, CA Technologies is acquiring security software provider Xceedium. READ MORE

IT Blogwatch: Here's why Apple won't run its own cellular service (unless it will)

Remember those rumors about Apple doing an end-run around the carriers? You know: how it would offer its own ''soup-to-nuts'' wireless service? Well, about that. Here's Apple's flat denial. READ MORE

White Paper: Imperva

2015 Gartner Magic Quadrant for Web App Firewall

Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall—the only company positioned in the leader's quadrant by Gartner in each of the two years this report has been published. View now

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.

Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals. Nominations close July 31. To make a nomination, click here.

Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the third year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here.

Computerworld's 2015 cloud computing survey is underway!
Computerworld is conducting a brief survey regarding cloud computing initiatives, and we would value your input. This confidential survey should take no more than 10 minutes of your time. Take the survey here.

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report on the top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.

Follow Computerworld

You are currently subscribed to computerworld_dailynews as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2015 Computerworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@computerworld.com. **

 

No comments: