How to kill Java dead, dead, dead

Java security comes down to 'war of attrition' | EMC combines 'bring your own storage' with cloud-based file sharing

Today's InfoWorld Headlines: First Look

Forward this to a Friend >>>


How to kill Java dead, dead, dead
Once again, flaws in Java are creating big holes that hackers exploit to victimize users and, even worse, sabotage or spy on many of the computers that run key business processes at utilities, banks, hospitals, and government agencies. Enough already. Read More


WHITE PAPER: IBM

IBM WebSphere MQ: The Messaging Backbone
IBM WebSphere MQ offers assured delivery of messages between applications and systems running on virtually every commercial IT platform. This IBM middleware is used as the fundamental messaging backbone for mission-critical environments... Read More

WHITE PAPER: IBM

Drive Growth and Value with Proven BPM Solutions from IBM
BPM aligns strategic imperatives with internal capabilities and utilizes technology in ways that maximize the productivity of people, processes and systems. Discover how midsize firms have seen success with BPM by starting small, thinking big and scaling fast. Read Now

Java security comes down to 'war of attrition'
Oracle will have to fight a war of attrition to keep Java secure, a security analyst said this week in reflecting on the latest malady affecting the standard edition of Java. While Java is again under attack, as it has been for the past year or so, Ross Barrett, senior manager of security at vendor Rapid7, is confident about Java's security for the long term: "It will just be a war of attrition. Oracle will make [Java] more secure over time." Read More

EMC combines 'bring your own storage' with cloud-based file sharing
EMC today revealed the latest fruits of its acquisition of file-sharing service Synplicity, now offering companies the option to use the cloud-based service while storing the data in-house on their own EMC-branded hardware. The idea behind EMC's play here is to give users the convenience of a cloud-hosted file-sharing service through which they can share files with anyone -- both inside and outside the firewall and across all types of devices -- while granting IT greater control over where potentially sensitive data resides and how it's shared Read More

5 places your data goes to hide
"Information wants to be free" is a gross understatement. Enterprises blanket their systems with security in the attempt to saturate every data repository with protection. Organizations affirm the logic of layering everything from access management to security zones to safeguard information assets. Yet, somehow, data still leaks. Real world exposure occurs virtually on a day-to-day basis. Advanced malware attacks get a lot of ink, but careless employees, incomplete policies, and the invasion of consumer technologies create plenty of risks as well. Here are five places where data sometimes avoids the protective eye of security systems and policies. Read More

RIM attracts 15,000 apps for BlackBerry 10 in two days
It's starting to look like the BlackBerry store will be well stocked with apps when Research In Motion launches BlackBerry 10 at the end of this month. The company held an event over the weekend where it offered app developers incentives to port their programs to the BlackBerry 10 platform and managed to attract 15,000 app submissions. Read More



Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_first_look as marketing@newsnews.org.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2013 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Comments