Wednesday, August 31, 2011

Court to hear arguments in warrantless wiretapping cases

Computerworld Security: Issues and Trends: August 31, 2011
===============================================================

Court to hear arguments in warrantless wiretapping cases

The Court of Appeals for the Ninth Circuit will begin hearing arguments on
Wednesday on two related lawsuits involving the constitutionality and the
legality of warrantless wiretaps of phone and email conversations of U.S.
citizens by the government.
http://cwonline.computerworld.com/t/7533650/818816226/528609/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: SEPATON and Hitachi Data Systems~~~~~~~~~~~~~~~~~~~~~

Data Growth and Protection: Addressing the Challenge

How does your organization deal with the data deluge? This white paper explores
new research that gets to the heart of the challenges of protecting and managing
the data you already deal with and preparing for the ever-increasing volumes of
data to come. And, it discusses how a single, scaleable solution can address
these issues.

http://cwonline.computerworld.com/t/7533650/818816226/528610/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Tenn. BlueCross finishes companywide data encryption
http://cwonline.computerworld.com/t/7533650/818816226/528611/0/

2. VMworld: Security, regulatory concerns still a challenge in virtualization
http://cwonline.computerworld.com/t/7533650/818816226/528612/0/

3. MIT researchers craft defense against wireless man-in-middle attacks
http://cwonline.computerworld.com/t/7533650/818816226/528613/0/

4. New Windows worm spreads by attacking weak passwords
http://cwonline.computerworld.com/t/7533650/818816226/528614/0/

5. Security Manager's Journal: Keeping the DMZ safe
http://cwonline.computerworld.com/t/7533650/818816226/528615/0/

6. Scariest IPv6 attack scenarios
http://cwonline.computerworld.com/t/7533650/818816226/528616/0/

7. Researchers see updated Zeus malware
http://cwonline.computerworld.com/t/7533650/818816226/528617/0/

8. Richi Jennings: Preventing security threats from cleaning staff
http://cwonline.computerworld.com/t/7533650/818816226/528618/0/

9. Opinion: Dealing with those risky mobile workers
http://cwonline.computerworld.com/t/7533650/818816226/528619/0/

10. Red Cross comm team ready for disasters
http://cwonline.computerworld.com/t/7533650/818816226/528620/0/

11. From CIO.com: Cloud growth prompts shift in enterprise security strategies
http://cwonline.computerworld.com/t/7533650/818816226/528621/0/

12. Scot Finnie: This is no time to skimp on security
http://cwonline.computerworld.com/t/7533650/818816226/528622/0/

13. AES proved vulnerable by Microsoft researchers
http://cwonline.computerworld.com/t/7533650/818816226/528623/0/

14. Security Manager's Journal: New economic woes lead to deep cuts
http://cwonline.computerworld.com/t/7533650/818816226/528624/0/

15. Dropbox cloud was a haven for data thieves, researchers say
http://cwonline.computerworld.com/t/7533650/818816226/528625/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: Cymphonix~~~~~~~~~~~~~~~~~~~~~

Strategies Behind Managing Internet Traffic

At a time when the number of Internet-connected applications is exploding, now
more than ever IT needs maximum visibility into each and everyone of these
connections.

http://cwonline.computerworld.com/t/7533650/818816226/528626/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tenn. BlueCross finishes companywide data encryption

BlueCross BlueShield of Tennessee, responding to the theft of 57 hard drives in
2009, has completed a $6 million project to encrypt all of its stored data.
http://cwonline.computerworld.com/t/7533650/818816226/528611/0/

VMworld: Security, regulatory concerns still a challenge in virtualization

While VMware users harbor little doubt about the cost savings and productivity
gains brought by virtualizing their networks, security concerns still exist on
many fronts, whether it's figuring out how to meet regulatory compliance with
auditors, or evaluating cloud services.
http://cwonline.computerworld.com/t/7533650/818816226/528612/0/

MIT researchers craft defense against wireless man-in-middle attacks

A new technique crafted by MIT researches can detect the tampering that's
essential to man-in-the-middle attacks in wireless networks.
http://cwonline.computerworld.com/t/7533650/818816226/528613/0/

New Windows worm spreads by attacking weak passwords

A new Windows worm is working its way through company networks by taking
advantage of weak passwords, security researchers said.
http://cwonline.computerworld.com/t/7533650/818816226/528614/0/

Security Manager's Journal: Keeping the DMZ safe

A security manager has to be vigilant about what goes into the exposed portion
of the company network, and he has to make sure it's all configured correctly.
http://cwonline.computerworld.com/t/7533650/818816226/528615/0/

Scariest IPv6 attack scenarios

Experts are reporting a rise in the number of attacks that take advantage of
known vulnerabilities of IPv6, a next-generation addressing scheme that is being
adopted across the Internet. IPv6 replaces the Internet's main communications
protocol, which is known as IPv4.
http://cwonline.computerworld.com/t/7533650/818816226/528616/0/

Researchers see updated Zeus malware

A dangerous piece of malicious code responsible for stealing money from online
bank accounts is being updated with new functions after its source code was
leaked earlier this year, according to security researchers.
http://cwonline.computerworld.com/t/7533650/818816226/528617/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: SAP~~~~~~~~~~~~~~~~~~~~~

How to Create a Modern BI Strategy for Mid-Size Businesses

As technology changes, so does BI. Keeping up with these changes to get the most
out of your BI strategy can be challenging, but not if you have the right tools
and services in place. With technology advances such as social networking and
mobility, how do BI and analytics fit in?

http://cwonline.computerworld.com/t/7533650/818816226/528627/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Richi Jennings: Preventing security threats from cleaning staff

Do you know who's in your building at night? Can you positively vouch for all
those here-today, gone-tomorrow contract staff who clean and maintain your
offices? Physical access is a worryingly simple vector for data-stealing
malware, as we'll see in this edition of The Long View. (Insider - free
registration required.)

http://cwonline.computerworld.com/t/7533650/818816226/528618/0/

Opinion: Dealing with those risky mobile workers

We recently completed a study, in partnership with Symantec, that looked at the
security and compliance risks of a mobile workforce. It affirmed what I've
believed for a long time, namely, that there is a consensus that mobile workers
pose a great risk and that, for the most part, businesses are not prepared to
mitigate that risk.
http://cwonline.computerworld.com/t/7533650/818816226/528619/0/

Red Cross comm team ready for disasters

While most businesses back up data and records as potential disasters approach,
the American Red Cross has a communications and information systems
infrastructure built to bring key data into areas ravaged by storms like
Hurricane Irene.
http://cwonline.computerworld.com/t/7533650/818816226/528620/0/

From CIO.com: Cloud growth prompts shift in enterprise security strategies

What a different global economy this would be if it were only a little bit more
like the cloud. As the financial markets go through their bipolar mood swings
with every wrenching headline, the market for cloud services has marched
steadily upward and onward, seemingly unfazed by the concerns of the non-virtual
world.
http://cwonline.computerworld.com/t/7533650/818816226/528621/0/

Scot Finnie: This is no time to skimp on security

Security threats have changed in recent years, with one fundamental difference
being that the motives for breaches have multiplied.
http://cwonline.computerworld.com/t/7533650/818816226/528622/0/

AES proved vulnerable by Microsoft researchers

Researchers have discovered a way to break the widely used Advanced Encryption
Standard (AES), the encryption algorithm used to secure most all online
transactions and wireless communications.
http://cwonline.computerworld.com/t/7533650/818816226/528623/0/

Security Manager's Journal: New economic woes lead to deep cuts

Needed security projects get the ax. Can layoffs be far behind?
http://cwonline.computerworld.com/t/7533650/818816226/528624/0/

Dropbox cloud was a haven for data thieves, researchers say

Files entrusted to cloud-storage provider Dropbox were susceptible to
unauthorized access via three attacks devised by security researchers, but the
provider has since closed the vulnerabilities.
http://cwonline.computerworld.com/t/7533650/818816226/528625/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Computerworld's IT Careers Special Report: What's the IT job market look like?

The editorial department of Computerworld is preparing a special report on IT
careers, and we're interested in your feedback.

This short survey contains fewer than 10 questions about your IT career plans
and job search status and your predictions for the future of the IT profession,
plus demographic questions, and takes less than 10 minutes to complete.

Click here to take the survey: http://cwonline.computerworld.com/t/7533650/818816226/525081/0/

Results of this survey will be part of the December 19 special report on IT
careers.



COMPUTERWORLD'S 2012 PREMIER 100 IT LEADERS AWARDS

Know an IT leader? Now's your chance to get a worthy CIO or other top IT
executive at your company (or client or partner companies, in any industry)
nominated for the 2012 Premier 100 IT Leaders awards. Computerworld has launched
its annual search for technology professionals who have demonstrated leadership
in their organizations through the use of IT and have the strategic vision to
align technology with business goals.

Nominations are being collected now through August 31. Nominate someone today!

http://cwonline.computerworld.com/t/7533650/818816226/510553/0/


CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Can Apple maintain its mojo without Steve Jobs at the helm?

http://cwonline.computerworld.com/t/7533650/818816226/527522/0/

SHARK TANK OF THE DAY
______________________

Who says the hardware wasn't fast back then?

Flashback to the 1960s, when punch cards are still the the data-entry technology
of choice where this pilot fish works -- and the failure of one highly qualified
keypunch operator is an ongoing mystery.

http://cwonline.computerworld.com/t/7533650/818816226/528523/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7533650/818816226/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7533650/818816226/311619/0/

Facebook: http://cwonline.computerworld.com/t/7533650/818816226/311620/0/

Twitter: http://cwonline.computerworld.com/t/7533650/818816226/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7533650/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89NzUzMzY1MA%3d%3d&x=119b0a0c

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7533650/818816226/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7533650/818816226/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7533650/818816226/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:32 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive