Computerworld Security: Issues and Trends: May 25, 2011
===============================================================
Six rising threats from cybercriminals
Hackers are industrious folks -- they stay up late devising new ways to attack
individuals and businesses. Watch out for these cyberattacks that can turn
smartphones into texting botnets, shut off electricity to homes and businesses,
jam GPS signals and more.
http://cwonline.computerworld.com/t/7355823/818816226/513457/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast~~~~~~~~~~~~~~~~~~~~~
A Three Step Plan for Migrating to Microsoft Exchange 2010
Harnessing the powerful new features of Microsoft Exchange 2010 – but without
introducing additional risk, cost and complexity during the migration process –
is a challenge many CIOs are about to face. We consider the risks involved and
propose actions businesses can take to mitigate them.
http://cwonline.computerworld.com/t/7355823/818816226/513458/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Review: Check Point's new security blades cut both ways
http://cwonline.computerworld.com/t/7355823/818816226/513459/0/
2. Dimension Data finds vulnerabilities on Cisco devices
http://cwonline.computerworld.com/t/7355823/818816226/513460/0/
3. Protocol analyzers: How to compare and use them
http://cwonline.computerworld.com/t/7355823/818816226/513461/0/
4. Protocol analyzers: Dos and don'ts
http://cwonline.computerworld.com/t/7355823/818816226/513462/0/
5. Microsoft: One in 14 downloads is malicious
http://cwonline.computerworld.com/t/7355823/818816226/513463/0/
6. Mac malware threat getting serious
http://cwonline.computerworld.com/t/7355823/818816226/513464/0/
7. Kenneth van Wyk: Mobile security isn't going to just happen
http://cwonline.computerworld.com/t/7355823/818816226/513465/0/
8. How to stop your executives from being harpooned
http://cwonline.computerworld.com/t/7355823/818816226/513466/0/
9. How to get smarter about CRM security
http://cwonline.computerworld.com/t/7355823/818816226/513467/0/
10. Security Manager's Journal: Tracking the ROI on SIEM
http://cwonline.computerworld.com/t/7355823/818816226/513468/0/
11. Sharon Machlis: Is your sensitive company info being leaked on LinkedIn?
http://cwonline.computerworld.com/t/7355823/818816226/513469/0/
12. Senators: New smartphone tracking law needed
http://cwonline.computerworld.com/t/7355823/818816226/513470/0/
13. Sharky: Just lucky, I guess
http://cwonline.computerworld.com/t/7355823/818816226/513471/0/
14. Darlene Storm: Interview: Slick social engineers to test their schmooze power at Defcon 19
http://cwonline.computerworld.com/t/7355823/818816226/513472/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Microsoft~~~~~~~~~~~~~~~~~~~~~
Is Microsoft Desktop Virtualization for you?
Desktop Virtualization provides a comprehensive suite of solutions that enables
companies to give their employees flexibility to work everywhere; simplifying
compliance and management through a centralized and unified infrastructure.
Learn how IT is empowering users with Desktop Virtualization with this on-demand
roundtable.
http://cwonline.computerworld.com/t/7355823/818816226/479683/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Review: Check Point's new security blades cut both ways
If you're in the market for endpoint protection, Check Point's new R80 Unified
Endpoint Security Management product shows promise.
http://cwonline.computerworld.com/t/7355823/818816226/513459/0/
Dimension Data finds vulnerabilities on Cisco devices
Large numbers of companies using Cisco network equipment are still vulnerable to
a single security vulnerability flaw nearly two years after a patch was issued,
an analysis of network scans by Dimension Data has found.
http://cwonline.computerworld.com/t/7355823/818816226/513460/0/
Protocol analyzers: How to compare and use them
Protocol analyzers are the indispensable tools that your IT staff deploys on the
network when it's not behaving properly. Sharp, experienced admins can examine
the live network data or a saved packet-capture file and figure out why
connections are intermittent, why users are complaining that the network is slow
or they can't get to their file server, or why voice over IP isn't working in a
branch office.
http://cwonline.computerworld.com/t/7355823/818816226/513461/0/
Protocol analyzers: Dos and don'ts
As with any tool, protocol analyzers need skilled implementation. Here is advice
from the front lines. (Insider content - free registration
required.)
http://cwonline.computerworld.com/t/7355823/818816226/513462/0/
Microsoft: One in 14 downloads is malicious
The next time a Web site says to download new software to view a movie or fix a
problem, think twice. There's a pretty good chance that the program is
malicious.
http://cwonline.computerworld.com/t/7355823/818816226/513463/0/
Mac malware threat getting serious
With the recent release of the first Trojan construction kit for Mac OS X,
there's more credence to the thought that market share, not innate security
goodness, is the game changer for the Mac's seeming immunity.
http://cwonline.computerworld.com/t/7355823/818816226/513464/0/
Kenneth van Wyk: Mobile security isn't going to just happen
Security professionals need to get hands-on with the software that runs on
mobile devices and engage with the developers who put all those apps in users'
hands.
http://cwonline.computerworld.com/t/7355823/818816226/513465/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Cisco Systems, Inc. ~~~~~~~~~~~~~~~~~~~~~
Social Technologies Add Business Value
Social technologies are moving from the consumer space into the enterprise, and
Enterprise Social Software (ESS) is changing how people work. A white paper
based on a Forrester Consulting survey commissioned by Cisco reveals the
benefits and inhibitors faced by decision makers and how ESS is transforming
business processes.
http://cwonline.computerworld.com/t/7355823/818816226/507837/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to stop your executives from being harpooned
'Whaling' is a growing security threat that uses personalized phishing
techniques to get your most sensitive data and access to your key networks.
http://cwonline.computerworld.com/t/7355823/818816226/513466/0/
How to get smarter about CRM security
If Value Engineering is the identification of different implementation
strategies to achieve the business goal, the ultimate in value engineering is to
identify requirements that don't need to be done in the first place. Although
security and access control would seem to be a poor candidate for this kind of
requirements elimination, in many situations the technical solutions are so
clumsy and expensive that there's almost no ROI.
http://cwonline.computerworld.com/t/7355823/818816226/513467/0/
Security Manager's Journal: Tracking the ROI on SIEM
The company's limited deployment of a security information and event management
tool is paying off. But now it's time to convince the CIO and CFO that the
payoff is real.
http://cwonline.computerworld.com/t/7355823/818816226/513468/0/
Sharon Machlis: Is your sensitive company info being leaked on LinkedIn?
If LinkedIn isn't on your worry list of places where confidential information
may be escaping into the wild, perhaps it should be.
http://cwonline.computerworld.com/t/7355823/818816226/513469/0/
Senators: New smartphone tracking law needed
The U.S. Congress needs to pass new laws to protect smartphone customers from
having their locations tracked by operating systems and applications, members of
a Senate subcommittee said.
http://cwonline.computerworld.com/t/7355823/818816226/513470/0/
Sharky: Just lucky, I guess
Consultant pilot fish is dispatched to perform a disaster recovery test at a
client site -- and this time, the operative word really is "disaster."
http://cwonline.computerworld.com/t/7355823/818816226/513471/0/
Darlene Storm: Interview: Slick social engineers to test their schmooze power at Defcon 19
Defcon 19 is right around the corner, which means so is the social engineering
contest that tends to freak out companies and alarm the feds. Interview with
Chris Hadnagy about what's new for the Schmooze Strikes Back contest.
http://cwonline.computerworld.com/t/7355823/818816226/513472/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SHARE YOUR THOUGHTS ABOUT CLOUD COMPUTING
Where do you think cloud computing is headed? This survey enables you to share
your views on events, trends and technology changes that will be driven by cloud
computing. Please provide your email address at the end of the survey and we
will share the survey results with you. That knowledge can help you shape your
private, public and hybrid cloud strategy and plans for the future.
The survey is easy. Simply decide whether you agree, disagree or are uncertain
about the likelihood of each potential future event or trend -- taking careful
note of the timeframe in the question.
Results from this survey will be used to shape a session called "Future
Proofing: An Interactive Discussion" at the Cloud Leadership Forum, which will
be held in California on June 20 and June 21 at the Hyatt Regency Santa Clara.
Many thanks for your help!
http://cwonline.computerworld.com/t/7355823/818816226/509160/0/
CAST YOUR VOTE IN OUR LATEST QUICKPOLL
Can Intel beat ARM in the mobile chip wars?
http://cwonline.computerworld.com/t/7355823/818816226/512672/0/
SHARK TANK OF THE DAY
______________________
See, it's not THAT kind of air filter
It's a few decades ago, and this young IT pilot fish with a shiny new computer
science degree is assigned responsibility for keeping a new minicomputer up and
running -- which is harder than it should be.
http://cwonline.computerworld.com/t/7355823/818816226/513384/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/7355823/818816226/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/7355823/818816226/311619/0/
Facebook: http://cwonline.computerworld.com/t/7355823/818816226/311620/0/
Twitter: http://cwonline.computerworld.com/t/7355823/818816226/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7355823/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzM1NTgyMw%3d%3d&x=df430073
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7355823/818816226/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7355823/818816226/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7355823/818816226/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
0 comments:
Post a Comment