MUST READ 8 Ways Apple Could Make A Cheaper iPhone By Thomas Claburn To build an iPhone that's affordable in emerging markets, Apple will have to cut some corners or rethink the iPhone entirely. We break down some options.
Anonymous Says DDoS Attacks Like Free Speech Hacktivist collective Anonymous petitions the White House to make DDoS attacks part of First Amendment protections. Shutdown attacks are akin to Occupy protests, group argues.
FEATURED REPORTS Fundamentals: Cloud ID Management Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications. Download Now (Registration Required)
Research: 2012 Application Security Survey Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps. Download Now (Registration Required)
12 Best iPhone, iPad Apps Of 2012 You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.
20 Great Ideas To Steal In 2012 Are you playing it too safe, IT leaders? Take these InformationWeek 500 projects along to rev up your next brainstorming session.
Gadgets, Gizmos and geekery at CES Pepcom Pepcom's technology showcase at CES 2013 has 100ï¿½ï¿½ï¿½s of companies showing off their consumer wares to fans. Everything from voice-control watches to Ubuntu smartphones and life-vests that pulsate wirelessly to the beat of your ipod. Watch
Is Your Network Ready for BYOD? Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@example.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.