MUST READ How To Scare Off Your Best IT People By Jonathan Feldman We put so much into our communications with customers, yet we spend comparatively little time communicating to "our most important resource."
FEATURED REPORTS Fundamentals: Cloud ID Management Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications. Download Now (Registration Required)
Research: 2012 Application Security Survey Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps. Download Now (Registration Required)
10 Mobile Health Apps From Uncle Sam New mobile apps from the Department of Health and Human Services, for consumers and doctors alike, let you search medical literature, locate health centers, fight drug abuse and much more. View Now
Is Your Network Ready for BYOD? Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@example.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.