Computerworld Security: Issues and Trends: June 08, 2011
===============================================================
Cybersecurity research consortium: New tech on the way
An 18-month-old cybersecurity research consortium organized by Northrop Grumman
is making progress and should have technologies ready to deploy in about a year,
officials said.
http://cwonline.computerworld.com/t/7376119/818816226/515542/0/
~~~~~~~~~~~~~~~~~~~DOWNLOAD: Symantec~~~~~~~~~~~~~~~~~~~~~
New! Symantec Endpoint Protection 12
Modern malware rarely strikes the same way twice. Today's malicious code rapidly
mutates, bypassing traditional defenses. Traditional antivirus approaches no
longer work. Download the Symantec Endpoint Protection 12 beta to see how
Symantec can help mitigate threats today and tomorrow without sacrificing
performance.
http://cwonline.computerworld.com/t/7376119/818816226/515543/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Mobile app security: 5 ways to protect your smartphone
http://cwonline.computerworld.com/t/7376119/818816226/515544/0/
2. When the worst happens: SharePoint recovery
http://cwonline.computerworld.com/t/7376119/818816226/515545/0/
3. Security Manager's Journal: Giving cloud storage the ax
http://cwonline.computerworld.com/t/7376119/818816226/515546/0/
4. Bart Perkins: Data breaches' costly fallout
http://cwonline.computerworld.com/t/7376119/818816226/515547/0/
5. Develop a cloud computing error-logging strategy
http://cwonline.computerworld.com/t/7376119/818816226/515548/0/
6. Richi Jennings: RSA SecurID: Egg meets face
http://cwonline.computerworld.com/t/7376119/818816226/515549/0/
7. Michael Horowitz: Why the bad guys are winning
http://cwonline.computerworld.com/t/7376119/818816226/515550/0/
8. Risk's rewards: Organizational models for ERM
http://cwonline.computerworld.com/t/7376119/818816226/515551/0/
9. Apple iOS: Why it's the most secure OS, period
http://cwonline.computerworld.com/t/7376119/818816226/515552/0/
10. So, why are senior U.S. officials using Gmail?
http://cwonline.computerworld.com/t/7376119/818816226/515553/0/
11. Big questions about cyberwar
http://cwonline.computerworld.com/t/7376119/818816226/515554/0/
12. Darlene Storm: Homeland Security testing mind-reading terrorist 'pre-crime' detectors
http://cwonline.computerworld.com/t/7376119/818816226/515555/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: F5~~~~~~~~~~~~~~~~~~~~~
WAN Optimization for VDIs
VDI consolidates remote desktop management, but in order to ensure success,
bumps in the WAN must be avoided. F5 and VMware deliver WAN optimization that
controls the amount of data passed back and forth between branches, removing
redundant application data and optimizing unique data for each desktop.
http://cwonline.computerworld.com/t/7376119/818816226/515556/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mobile app security: 5 ways to protect your smartphone
Smartphones and mobile apps, particularly in the Android family, are becoming
more susceptible to hackers. Bill Snyder of CIO.com highlights five easy ways to
fortify your mobile apps against the bad guys.
http://cwonline.computerworld.com/t/7376119/818816226/515544/0/
When the worst happens: SharePoint recovery
SharePoint has become vital to the business infrastructure and, in many
companies, it's even used as the company's face to the world: its public facing
Web site. Because of this dependency and high visibility, a well-thought-out
disaster recovery strategy for SharePoint is imperative.
http://cwonline.computerworld.com/t/7376119/818816226/515545/0/
Security Manager's Journal: Giving cloud storage the ax
None of the SaaS storage vendors at this point have implemented adequate
safeguards that will keep corporate data safe.
http://cwonline.computerworld.com/t/7376119/818816226/515546/0/
Bart Perkins: Data breaches' costly fallout
One estimate puts the cost of the average breach at $7.2 million, but indirect
costs can be even higher. (Insider content - free registration
required.)
http://cwonline.computerworld.com/t/7376119/818816226/515547/0/
Develop a cloud computing error-logging strategy
Error handling and trace logs are as old as the hills. Of course this is handled
in the clouds, right? Keep laughing...
http://cwonline.computerworld.com/t/7376119/818816226/515548/0/
Richi Jennings: RSA SecurID: Egg meets face
In the case of the SecurID hack three months ago, RSA's strategy -- to deny
anything was worrisome -- has come back to bite it. Hard. The company is having
to learn some of the oldest lessons in security -- and in PR. (Insider
content - free registration required.)
http://cwonline.computerworld.com/t/7376119/818816226/515549/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Microsoft~~~~~~~~~~~~~~~~~~~~~
How Microsoft® Exchange Online Helps Solve IT Challenges
This whitepaper explores the benefits of moving email to the cloud, including
lower costs, increased agility, simpler management, and higher-quality services.
http://cwonline.computerworld.com/t/7376119/818816226/515557/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Michael Horowitz: Why the bad guys are winning
A depressingly long list of reasons.
http://cwonline.computerworld.com/t/7376119/818816226/515550/0/
Risk's rewards: Organizational models for ERM
Do you know the butterfly effect? Well, there are billions of butterflies in the
world, and you want to keep an eye on the ones that, according to chaos theory,
are about to flap their wings and start a chain of events that will eventually
result in a hurricane half a world away. The bigger the organization, the more
butterflies there are to worry about.
http://cwonline.computerworld.com/t/7376119/818816226/515551/0/
Apple iOS: Why it's the most secure OS, period
Several factors have combined to make the iPhone's and iPad's operating system
into what is arguably the most secure commercial OS -- desktop or mobile.
http://cwonline.computerworld.com/t/7376119/818816226/515552/0/
So, why are senior U.S. officials using Gmail?
Google's announcement that hackers had gone after the Gmail accounts of senior
U.S. officials raises a question: What are government officials doing using
Gmail?
http://cwonline.computerworld.com/t/7376119/818816226/515553/0/
Big questions about cyberwar
The Pentagon is expected to announce a cyberstrategy this month that concludes a
cyberattack on the U.S. can be an act of war, and while the damage from such an
assault may warrant that position, hopefully this just amounts to loud barking
given the perils involved.
http://cwonline.computerworld.com/t/7376119/818816226/515554/0/
Darlene Storm: Homeland Security testing mind-reading terrorist 'pre-crime' detectors
Whether someone cuts you off in traffic or you have a spat with your significant
other, if you are having adrenaline-driven aggressive thoughts and you are in
northeastern USA, you might quickly take a chill pill because that's where
terrorist "pre-crime" detectors are being tested by DHS.
http://cwonline.computerworld.com/t/7376119/818816226/515555/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SHARE YOUR THOUGHTS ABOUT CLOUD COMPUTING
Where do you think cloud computing is headed? This survey enables you to share
your views on events, trends and technology changes that will be driven by cloud
computing. Please provide your email address at the end of the survey and we
will share the survey results with you. That knowledge can help you shape your
private, public and hybrid cloud strategy and plans for the future.
The survey is easy. Simply decide whether you agree, disagree or are uncertain
about the likelihood of each potential future event or trend -- taking careful
note of the timeframe in the question.
Results from this survey will be used to shape a session called "Future
Proofing: An Interactive Discussion" at the Cloud Leadership Forum, which will
be held in California on June 20 and June 21 at the Hyatt Regency Santa Clara.
Many thanks for your help!
http://cwonline.computerworld.com/t/7376119/818816226/509160/0/
CAST YOUR VOTE IN OUR LATEST QUICKPOLL
Should Apple be forced to show Samsung its next iPhone and iPad?
http://cwonline.computerworld.com/t/7376119/818816226/514704/0/
SHARK TANK OF THE DAY
______________________
Keeping busy
At this small college, the three-person IT department is also responsible for
the on-campus analog telephone system, so when a dean's phone goes haywire,
that's who he calls.
http://cwonline.computerworld.com/t/7376119/818816226/515558/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/7376119/818816226/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/7376119/818816226/311619/0/
Facebook: http://cwonline.computerworld.com/t/7376119/818816226/311620/0/
Twitter: http://cwonline.computerworld.com/t/7376119/818816226/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7376119/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzM3NjExOQ%3d%3d&x=a1220b2b
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7376119/818816226/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7376119/818816226/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7376119/818816226/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
0 comments:
Post a Comment