| InfoWorld Tech Leadership Report | | | | But Red Hat, Google, and IBM might be in the mix as suitors, should Docker be interested in a deal. READ MORE | | | Issue highlights 1. Email security and spear phishing secrets of an ex-hacker 2. Android on BlackBerry: More harm than good 3. The pros and cons of going cloud-native | | White Paper: Webroot Software The Webroot 2015 Threat Brief provides the latest cyber threat trends collected from tens of millions of users and over 30 security technology partners and shows how collective threat intelligence that is shared across users and organizations is the only winning way to fight cybercrime. Learn more >> | | Technology and user training together can help CISOs protect their data against the attacks demonstrated by Kevin Mitnick. READ MORE | | An Android strategy is no sure winner for BlackBerry, due to market, execution, and technological reasons. READ MORE | | The cloud's scalability, efficiency, and performance are alluring, but the lock-in price can be too high. READ MORE | | White Paper: Kaspersky Lab, Inc. Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab's Top 10 Tips for Educating Employees about Cybersecurity to learn: Why and how to develop an effective security policy Examples of common threats to employees and your business Tools to reduce risk and cybercrime Learn More | | TODAY'S KEY TECH STORIES, DELIVERED TO YOUR INBOX FIRST THING Start your workday with InfoWorld Daily, and find out what the tech world will be talking about all day. Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. | | | | | |