Check out our one-minute video review of the hottest stories for the week, including why crypto backdoors for law enforcement are a bad idea, and how Wall Street is looking to IT to squeeze new efficiencies and more profits.
Get all the details using the links below, and don't forget to answer our question of the week: Will tablets ever replace laptops?
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data. In the Partners' Role In Perimeter Security report, we'll discuss concrete strategies such as setting standards that third-party providers must meet to keep your business, conducting in-depth risk assessments -- and ensuring that your network has controls in place to protect data in case these defenses fail. (Free registration required.)