Wednesday, December 21, 2011

Securing the daisy chain

Computerworld Security: Issues and Trends: December 21, 2011
===============================================================

Securing the daisy chain

Some cloud computing vendors outsource parts of their services to
subcontractors, who may in turn outsource to others. Here's how to know who has
your company's data and how secure it really is. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/7771938/818816226/545097/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco Systems, Inc. ~~~~~~~~~~~~~~~~~~~~~

Converge Your Networks for Flexibility

Cisco Unified Fabric offers the industry's largest and first fully interoperable
portfolio of Fiber Channel integrating storage and data networking to deliver
transparent convergence, massive three-dimensional scalability and sophisticated
intelligence. It also reduces your costs up to 45%.

http://cwonline.computerworld.com/t/7771938/818816226/544486/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Richi Jennings: Security in 2012: Let's start at the endpoint
http://cwonline.computerworld.com/t/7771938/818816226/545098/0/

2. Security minefield: 'Bring your own device' will bedevil IT security in 2012
http://cwonline.computerworld.com/t/7771938/818816226/545099/0/

3. What to do in the event of a data breach?
http://cwonline.computerworld.com/t/7771938/818816226/545100/0/

4. Kenneth Van Wyk: Your 2012 security action plan
http://cwonline.computerworld.com/t/7771938/818816226/545101/0/

5. Coming soon: Ubiquitous surveillance from Big Brother's wayback machine
http://cwonline.computerworld.com/t/7771938/818816226/545102/0/

6. On CIO.com: Putting a lock on password management
http://cwonline.computerworld.com/t/7771938/818816226/545103/0/

7. Darlene Storm: NFC mobile threats on the horizon: What happens when we wave our wallets to pay?
http://cwonline.computerworld.com/t/7771938/818816226/545104/0/

8. Sharky: Security: theory and practice
http://cwonline.computerworld.com/t/7771938/818816226/545105/0/

9. Google pulls 22 more malicious Android apps from Market
http://cwonline.computerworld.com/t/7771938/818816226/545106/0/

10. Cross-site scripting flaws plague web apps, report says
http://cwonline.computerworld.com/t/7771938/818816226/545107/0/

11. 5 IT security breakthroughs promise to thwart threats
http://cwonline.computerworld.com/t/7771938/818816226/545108/0/

12. Small company, big security challenges
http://cwonline.computerworld.com/t/7771938/818816226/545109/0/

13. Feds launch cloud security standards program
http://cwonline.computerworld.com/t/7771938/818816226/545110/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Red Hat~~~~~~~~~~~~~~~~~~~~~

FOUR STEPS TO A PRIVATE OR HYBRID CLOUD

STEP 3: OPTIMIZE AND AUTOMATE IT IN THE CLOUD. WEBINAR-DECEMBER 14, 2011. In the
From Virtualization to Cloud webinar series, Red Hat® and the IT Process
Institute guide you through the process and best practices of cloud-building.
Learn how to expand automation, manage hybrid and heterogeneous environments,
and update service management processes.

http://cwonline.computerworld.com/t/7771938/818816226/545014/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Richi Jennings: Security in 2012: Let's start at the endpoint

What security trends should we look out for in 2012? How should organizations
protect against new breeds of threat? Here are my thoughts about endpoint
protection trends, in The Long View. (Insider - free registration
required.)

http://cwonline.computerworld.com/t/7771938/818816226/545098/0/

Security minefield: 'Bring your own device' will bedevil IT security in 2012

The rapid adoption of the newest mobile devices -- especially the Apple iPhone
and iPad and the Google Android-based equivalents -- will be a huge disruptive
force in enterprise security next year. Not only will there be pressure to
decide how to protect and manage these devices, which are growing as malware
targets, the complexity of this task is magnified many times over because
companies are allowing employees to use their own personal smartphones and
tablets for business purposes.
http://cwonline.computerworld.com/t/7771938/818816226/545099/0/

What to do in the event of a data breach?

Even though it now appears there was no terrorist attack on a pump at an
Illinois water utility, the SCADA infiltration scare was a reminder that data
breaches can come from any number of angles. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/7771938/818816226/545100/0/

Kenneth Van Wyk: Your 2012 security action plan

One very effective way to improve your organization's security is to work more
closely with its software developers.
http://cwonline.computerworld.com/t/7771938/818816226/545101/0/

Coming soon: Ubiquitous surveillance from Big Brother's wayback machine

As the price of digital storage drops and the technology to tap electronic
communication improves, authoritarian governments will soon be able to perform
retroactive surveillance on anyone within their borders, according to a
Brookings Institute report.
http://cwonline.computerworld.com/t/7771938/818816226/545102/0/

On CIO.com: Putting a lock on password management

A cancer diagnostics firm is using a single sign-on service to secure a growing
pool of SaaS subscriptions.
http://cwonline.computerworld.com/t/7771938/818816226/545103/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: Akamai~~~~~~~~~~~~~~~~~~~~~

Video: Securing the Cloud in a Hyperconnected World

This whiteboard presentation covers strategic IT security initiatives within the
enterprise and explains how the Akamai Intelligent Platform provides an
unmatched level of defense against website, application, and data security
attacks.

http://cwonline.computerworld.com/t/7771938/818816226/545111/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: NFC mobile threats on the horizon: What happens when we wave our wallets to pay?

There are 35 million NFC-enabled mobile phones in the world and mobile payments
are predicted to reach $630 billion by 2014, making the mobile wallet a tempting
target to attack. Researchers launched a successful 'software-only' relay attack
on NFC mobile phones.

http://cwonline.computerworld.com/t/7771938/818816226/545104/0/

Sharky: Security: theory and practice

This IT pilot fish works for a company that now requires users to change their
passwords on a regular basis -- but it wasn't always that way.

http://cwonline.computerworld.com/t/7771938/818816226/545105/0/

Google pulls 22 more malicious Android apps from Market

Google has removed nearly two dozen malware-infected apps from its official
Android Market, according to San Francisco-based Lookout Security.
http://cwonline.computerworld.com/t/7771938/818816226/545106/0/

Cross-site scripting flaws plague web apps, report says

Cross-site scripting flaws are the most prevalent vulnerabilities found in Web
applications, posing a risk to data and intellectual property, according to a
study of thousands of applications by vendor Veracode.
http://cwonline.computerworld.com/t/7771938/818816226/545107/0/

5 IT security breakthroughs promise to thwart threats

For the past 25 years, a war has waged between malicious programmers and the
researchers trying to make computing safe for the enterprise. The battle has
shown no signs of subsiding — once a new countermeasure is deployed, the hackers
find new ways to make IT worried. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/7771938/818816226/545108/0/

Small company, big security challenges

Small company, big ambitions. Sounds like the classic entrepreneurial dream --
but what if it means you bear the burden of big-company regulatory or standards
compliance? (Insider - free registration required.)
http://cwonline.computerworld.com/t/7771938/818816226/545109/0/

Feds launch cloud security standards program

Federal agencies will soon have a government-wide security standard for
assessing, authorizing and monitoring cloud products and services.
http://cwonline.computerworld.com/t/7771938/818816226/545110/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SHARK TANK OF THE DAY
______________________

Hey, yelling always worked in court

This group of city-government agencies has just put Wi-Fi access points in each
of its conference rooms and let the users know that wireless is available. And
some users have clearly read the e-mail -- even if they don't really know what
it means.

http://cwonline.computerworld.com/t/7771938/818816226/545051/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The U.S. National Transportation Safety Board has recommended that states outlaw
the use of all electronic devices while driving. Should the use of personal
electronic devices be banned while driving?

http://cwonline.computerworld.com/t/7771938/818816226/544196/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7771938/818816226/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7771938/818816226/311619/0/

Facebook: http://cwonline.computerworld.com/t/7771938/818816226/311620/0/

Twitter: http://cwonline.computerworld.com/t/7771938/818816226/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7771938/818816226/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjI2LjVkZDFlMmZmNmU0ZWQ4ODJhN2FhYWUzOTEyOTUxNDExJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89Nzc3MTkzOA%3d%3d&x=88e6f7ce

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7771938/818816226/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7771938/818816226/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7771938/818816226/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:49 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive