Wednesday, March 28, 2012

Who holds the encryption keys?

Computerworld Security: Issues and Trends: March 28, 2012
===============================================================

Who holds the encryption keys?

Experts and IT leaders offer strategies for getting the most from the latest
encryption and digital rights management technologies.
http://cwonline.computerworld.com/t/7930152/823929840/557583/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: EMC~~~~~~~~~~~~~~~~~~~~~

Achieving Intelligence-Driven Information Security

New SBIC Report sponsored by RSA: Getting Ahead of Advanced Threats – Achieving
Intelligence-Driven Information Security. Get insights on developing real-time
knowledge on threats in order to prevent, detect, &predict attacks, make risk
decisions, optimize defensive strategies & enable action.

http://cwonline.computerworld.com/t/7930152/823929840/557584/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security Manager's Journal: Getting validation at the RSA Conference
http://cwonline.computerworld.com/t/7930152/823929840/557585/0/

2. Most 2011 cyberattacks were avoidable, Verizon says
http://cwonline.computerworld.com/t/7930152/823929840/557586/0/

3. How GSA is securing its cloud apps
http://cwonline.computerworld.com/t/7930152/823929840/557587/0/

4. IT supply chain security is weak at major U.S. agencies, says GAO
http://cwonline.computerworld.com/t/7930152/823929840/557588/0/

5. A clear-eyed look at APT
http://cwonline.computerworld.com/t/7930152/823929840/557589/0/

6. Study finds major flaws in single sign-on systems
http://cwonline.computerworld.com/t/7930152/823929840/557590/0/

7. What's the business case for GRC?
http://cwonline.computerworld.com/t/7930152/823929840/557591/0/

8. Darlene Storm: America is losing the cybersecurity war; China hacked every major US company
http://cwonline.computerworld.com/t/7930152/823929840/557592/0/

9. Governance at the speed of change
http://cwonline.computerworld.com/t/7930152/823929840/557593/0/

10. Next up for DLP: The cloud?
http://cwonline.computerworld.com/t/7930152/823929840/557594/0/

11. How CIOs can learn to catch insider crime
http://cwonline.computerworld.com/t/7930152/823929840/557595/0/

12. Most web masters don't know how their sites got hacked, report says
http://cwonline.computerworld.com/t/7930152/823929840/557596/0/

13. Cisco offers virtualized video surveillance
http://cwonline.computerworld.com/t/7930152/823929840/557597/0/

14. MDM: Part of the mobile security solution?
http://cwonline.computerworld.com/t/7930152/823929840/557598/0/

15. Who should the CISO report to?
http://cwonline.computerworld.com/t/7930152/823929840/557599/0/

16. EU to get tough on cybercrime, file-sharers to be spared
http://cwonline.computerworld.com/t/7930152/823929840/557600/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed~~~~~~~~~~~~~~~~~~~~~

PCI DSS Compliance with Stingray Application Firewall Module

PCI DSS is mandatory for any business that handles confidential cardholder data.
Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module
help with many parts of the PCI DSS specification, notably the web application
firewall (WAF) requirements of section 6.6.

http://cwonline.computerworld.com/t/7930152/823929840/557601/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security Manager's Journal: Getting validation at the RSA Conference

Our manager talks to colleagues and attends various breakout sessions and talks,
where he might learn something new or (even better) get validation for his
security program and priorities.
http://cwonline.computerworld.com/t/7930152/823929840/557585/0/

Most 2011 cyberattacks were avoidable, Verizon says

Despite rising concern that cyberattacks are becoming increasingly
sophisticated, hackers used relatively simple methods in more than 95% of data
breaches in 2011, according to a report compiled by Verizon.
http://cwonline.computerworld.com/t/7930152/823929840/557586/0/

How GSA is securing its cloud apps

As the General Services Administration (GSA) migrates to a work-anywhere,
work-anytime strategy, the real estate arm of the U.S. federal government is
discovering that having an iron-clad security strategy is critical to its
adoption of cloud-based applications.
http://cwonline.computerworld.com/t/7930152/823929840/557587/0/

IT supply chain security is weak at major U.S. agencies, says GAO

U.S. lawmakers called on three large U.S. government agencies, including the
Department of Energy, to start monitoring their IT purchases for possible
malware, counterfeits or other security flaws, after a watchdog agency pointed
out potential vulnerabilities in their IT supply-chain procedures.
http://cwonline.computerworld.com/t/7930152/823929840/557588/0/

A clear-eyed look at APT

Setting aside the hype, advanced persistent threats do present CISOs with a few
to-dos.
http://cwonline.computerworld.com/t/7930152/823929840/557589/0/

Study finds major flaws in single sign-on systems

The single sign-on protocols that allow users to sign in to a range of websites
with their Google or Facebook accounts suffer from security flaws that could
allow scammers to log in as somebody else, security researchers have reported.
http://cwonline.computerworld.com/t/7930152/823929840/557590/0/

What's the business case for GRC?

Does governance, risk and compliance (GRC) really pay off? It's a valid question
for any organization that's looking to formulate a corporate strategy and
implement software for managing GRC.
http://cwonline.computerworld.com/t/7930152/823929840/557591/0/

Darlene Storm: America is losing the cybersecurity war; China hacked every major US company

Richard Clarke, a former White House cybersecurity czar, said China has hacked
every major U.S. company. Clarke claimed that although the USA was behind
Stuxnet, America is defenseless against cyber espionage. The FBI's top cyber cop
agrees that the USA is outgunned, losing the war against cybercrooks, and
without changes, our unsustainable cybersecurity model will never offer a
reasonable expectation of security or privacy.

http://cwonline.computerworld.com/t/7930152/823929840/557592/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Hosting.com~~~~~~~~~~~~~~~~~~~~~

What if your key applications FAIL?

Build for 100% application availability in the Cloud with Microsoft SQL Server.
Achieve the highest levels of availability, performance, scalability, and
security for your mission-critical applications while minimizing cost.

http://cwonline.computerworld.com/t/7930152/823929840/557140/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Governance at the speed of change

The right approach to governance -- using real-time metrics -- can enable more
reliable applications, more agile IT, more satisfied business owners and,
ultimately, happier customers. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/7930152/823929840/557593/0/

Next up for DLP: The cloud?

Traditionally there have been two ways to host a data loss prevention security
service: An on-premise application managed by the customer, or an on-premise
application managed by the DLP supplier. BEW Global, a managed security service
provider, has a third way: Through the cloud.
http://cwonline.computerworld.com/t/7930152/823929840/557594/0/

How CIOs can learn to catch insider crime

Research shows that CIOs rarely discover the internal security threats that can
ruin companies, even though it frequently involves IT systems. Here's what needs
to change. (Insider - free registration required.)
http://cwonline.computerworld.com/t/7930152/823929840/557595/0/

Most web masters don't know how their sites got hacked, report says

Most owners of compromised websites don't know how their sites got hacked into
and only 6 percent detect the malicious activity on their own, according to a
report released by StopBadware and Commtouch.
http://cwonline.computerworld.com/t/7930152/823929840/557596/0/

Cisco offers virtualized video surveillance

Cisco announced a virtualized version of its Video Surveillance software for use
on its Unified Computing System platform for enterprise- or government-operated
video-camera deployments.
http://cwonline.computerworld.com/t/7930152/823929840/557597/0/

MDM: Part of the mobile security solution?

The good news for enterprises: Mobile devices are packed with power. A new
iPhone is 100 times lighter, 100 times faster, and 10 times less expensive than
the luggable notebooks of the early 1980s.
http://cwonline.computerworld.com/t/7930152/823929840/557598/0/

Who should the CISO report to?

It seems like a simple question. After all, there seems to be little debate
about where other C-suite officers should report. While there have been some
discussions about the reporting structure for such C-level executives as the
chief privacy officer and the chief compliance officer, these are relatively
tame compared to the heated debate that I have witnessed and been a part of over
the past few years.
http://cwonline.computerworld.com/t/7930152/823929840/557599/0/

EU to get tough on cybercrime, file-sharers to be spared

The European Commission is to get tough on cybercrime it revealed, but won't
target illegal file-sharing.
http://cwonline.computerworld.com/t/7930152/823929840/557600/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SHARK TANK OF THE DAY
______________________

QUIET PLEASE!

This pilot fish is working at a level 2 network help desk when a request comes
in from a client -- and one of fish's co-workers quickly volunteers to handle
it.

http://cwonline.computerworld.com/t/7930152/823929840/557321/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Apple's new iPad features a Retina display, LTE connectivity, and more -- but is
it advanced enough to stay ahead of rivals?

http://cwonline.computerworld.com/t/7930152/823929840/555583/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7930152/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7930152/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/7930152/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/7930152/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7930152/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzkzMDE1Mg%3d%3d&x=894be912

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7930152/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7930152/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7930152/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 12:50 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive