Wednesday, April 25, 2012

BYOD: 'The inmates of the asylum have control'

Computerworld Security: Issues and Trends: April 25, 2012
===============================================================

BYOD: 'The inmates of the asylum have control'

Mobile devices are multiplying and -- sanctioned or unsanctioned -- finding
their way onto corporate networks. For IT pros, the influx of personal mobile
devices to the corporate network is raising security concerns, creating
management challenges, and swamping the help desk with support calls.
http://cwonline.computerworld.com/t/7972232/823929840/561034/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: VeriSign~~~~~~~~~~~~~~~~~~~~~

VeriSign SSL, now from Symantec.

We're moving beyond the standard SSL. Added features now include Vulnerability
assessment, Malware scans & Seal-in-Search. Provide more robust security
functionality to your website while protecting your customers with VeriSign SSL,
now from Symantec.

http://cwonline.computerworld.com/t/7972232/823929840/561035/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Healthcare industry group builds cybersecurity threat center
http://cwonline.computerworld.com/t/7972232/823929840/561036/0/

2. Security Manager's Journal: Who's got your mail?
http://cwonline.computerworld.com/t/7972232/823929840/561037/0/

3. Macs more likely to carry Windows malware than Mac malware, Sophos says
http://cwonline.computerworld.com/t/7972232/823929840/561038/0/

4. Lessons for IT, Apple in Flashback brouhaha
http://cwonline.computerworld.com/t/7972232/823929840/561039/0/

5. Darlene Storm: Interview with Ed Skoudis: SANS Cyber Guardians hack to help America win the cyberwar
http://cwonline.computerworld.com/t/7972232/823929840/561040/0/

6. Weak passwords still subvert IT security
http://cwonline.computerworld.com/t/7972232/823929840/561041/0/

7. Most IT, security pros see Anonymous as serious threat
http://cwonline.computerworld.com/t/7972232/823929840/561042/0/

8. Tech groups pushing for cyberthreat info-sharing bill
http://cwonline.computerworld.com/t/7972232/823929840/561043/0/

9. Website vulnerabilities fall, but hackers become more skilled
http://cwonline.computerworld.com/t/7972232/823929840/561044/0/

10. CISPA sponsors support amendments addressing privacy concerns
http://cwonline.computerworld.com/t/7972232/823929840/561045/0/

11. Security, privacy ideas emerge at Demo Spring conference
http://cwonline.computerworld.com/t/7972232/823929840/561046/0/

12. E-voting system declares wrong winners in Florida
http://cwonline.computerworld.com/t/7972232/823929840/561047/0/

13. European Parliament agrees to send airline passenger data to U.S.
http://cwonline.computerworld.com/t/7972232/823929840/561048/0/

14. E.U. must invest in security technologies, says official
http://cwonline.computerworld.com/t/7972232/823929840/561049/0/

15. India overtakes U.S. as top email spam source
http://cwonline.computerworld.com/t/7972232/823929840/561050/0/

16. Russian cybercriminals earned $4.5 billion in 2011
http://cwonline.computerworld.com/t/7972232/823929840/561051/0/

17. Automatically encrypt files for your Google Drive
http://cwonline.computerworld.com/t/7972232/823929840/561052/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: EMC~~~~~~~~~~~~~~~~~~~~~

chieving Intelligence-Driven Information Security

New SBIC Report sponsored by RSA: Getting Ahead of Advanced Threats – Achieving
Intelligence-Driven Information Security. Get insights on developing real-time
knowledge on threats in order to prevent, detect, &predict attacks, make risk
decisions, optimize defensive strategies & enable action.

http://cwonline.computerworld.com/t/7972232/823929840/561053/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Healthcare industry group builds cybersecurity threat center

Looking to address growing cybersecurity threats in the healthcare industry the
Health Information Trust Alliance said it has established a centralized
Cybersecurity Incident Response and Coordination Center where organizations can
report incidents and get help remediating electronic medical security problems.
http://cwonline.computerworld.com/t/7972232/823929840/561036/0/

Security Manager's Journal: Who's got your mail?

When a chance discovery reveals that anyone in the company can access one
executive's email, the brainstorming begins.
http://cwonline.computerworld.com/t/7972232/823929840/561037/0/

Macs more likely to carry Windows malware than Mac malware, Sophos says

One in five Mac computers is likely to carry Windows malware, but only one in 36
is likely to be infected with malware specifically designed for the Mac OS X,
according to study performed by antivirus firm Sophos.
http://cwonline.computerworld.com/t/7972232/823929840/561038/0/

Lessons for IT, Apple in Flashback brouhaha

Although the number of Flashback-infected Macs is on the decline, the
reverberations from the outbreak will affect Apple and the businesses that have
increasingly adopted Macs. Columnist Ryan Faas explains.
http://cwonline.computerworld.com/t/7972232/823929840/561039/0/

Darlene Storm: Interview with Ed Skoudis: SANS Cyber Guardians hack to help America win the cyberwar

Did you know we have Cyber Guardians who protect the world from cybercrime?
These Red Team and Blue Team elite cybersecurity professionals are like the Navy
Seals, only behind a computer and hacking for America. In this interview, SANS'
Ed Skoudis talks about the need for more cyber warriors and the SANS Cyber
Guardian program.

http://cwonline.computerworld.com/t/7972232/823929840/561040/0/

Weak passwords still subvert IT security

A recent breach that exposed the Social Security numbers of more than 280,000
people in Utah to hackers has once again highlighted the well-recognized, but
often discounted, risks posed to organizations by weak and default passwords.
http://cwonline.computerworld.com/t/7972232/823929840/561041/0/

Most IT, security pros see Anonymous as serious threat

The majority of IT and security professionals believe that Anonymous and
hacktivists are among the groups that are most likely to attack their
organizations during the next six months, according to the results of a survey
sponsored by security vendor Bit9.
http://cwonline.computerworld.com/t/7972232/823929840/561042/0/

Tech groups pushing for cyberthreat info-sharing bill

Several technology trade groups are pushing the U.S. Congress to pass a
controversial cyberthreat information-sharing bill, despite ongoing privacy
concerns voiced by digital rights and civil liberties groups.
http://cwonline.computerworld.com/t/7972232/823929840/561043/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Imation Scalable Storage~~~~~~~~~~~~~~~~~~~~~

7 Simple Truths About Tiering Your Data

Dealing with the explosion of extreme data means more than containing it all.
It's about determining what data is most useful to your business and where
"speed meets need." Learn how you can use data tiering to transform unstructured
data into "content" while keeping protection high and costs low.

http://cwonline.computerworld.com/t/7972232/823929840/561054/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Website vulnerabilities fall, but hackers become more skilled

The number of coding mistakes on websites continues to fall but companies are
slow to fix issues that could be exploited by hackers working with improved
attack tools, a security expert said.
http://cwonline.computerworld.com/t/7972232/823929840/561044/0/

CISPA sponsors support amendments addressing privacy concerns

The sponsors of a controversial cyberthreat information-sharing bill will offer
new amendments to address privacy concerns, with changes focused on limiting how
government agencies can use information shared by private companies.
http://cwonline.computerworld.com/t/7972232/823929840/561045/0/

Security, privacy ideas emerge at Demo Spring conference

The cool new Internet ideas of yesteryear often create the headaches of today,
and some startups at the Demo conference are starting to try to solve those
problems.
http://cwonline.computerworld.com/t/7972232/823929840/561046/0/

E-voting system declares wrong winners in Florida

An optical-scan vote-tallying system, now used by some 300 U.S. municipalities,
misreported the results of an election in Palm Beach County, Fla., last month.
http://cwonline.computerworld.com/t/7972232/823929840/561047/0/

European Parliament agrees to send airline passenger data to U.S.

The European Parliament approved a controversial data transfer agreement with
the U.S. that has legislators sharply divided.
http://cwonline.computerworld.com/t/7972232/823929840/561048/0/

E.U. must invest in security technologies, says official

Digital agenda commissioner Neelie Kroes wants the E.U. to invest in security
technologies, and also called for more transparency in the security product
market during a speech at the Infosecurity Europe conference in London.
http://cwonline.computerworld.com/t/7972232/823929840/561049/0/

India overtakes U.S. as top email spam source

The volume of email spam that originated from India during the first three
months of 2012 exceeded the volume coming from the U.S. and transformed the
Asian country into the world top spam source in the world, security firm Sophos
said.
http://cwonline.computerworld.com/t/7972232/823929840/561050/0/

Russian cybercriminals earned $4.5 billion in 2011

Russian-speaking hackers earned an estimated $4.5 billion globally using various
online criminal tactics, Russian security analyst firm Group-IB said in a
report.
http://cwonline.computerworld.com/t/7972232/823929840/561051/0/

Automatically encrypt files for your Google Drive

Google launched Google Drive, a free-if-you-just-need-5GB-of-storage
Dropbox-like service that lets you easily store and share files in the cloud.
http://cwonline.computerworld.com/t/7972232/823929840/561052/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CALL FOR ENTRIES -- COMPUTERWORLD'S BUSINESS INTELLIGENCE BEST IN CLASS 2012

If your organization's BI project is innovative, has positively impacted your
business and has produced ROI, then we want to see your case study!

In our upcoming Aug. 27 issue, we will showcase a select group of the biggest
(and most fascinating) business decisions to which BI has contributed. Case
study submissions will be accepted now through April 27. Submit your nomination
here:

http://cwonline.computerworld.com/t/7972232/823929840/558910/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/7972232/823929840/558670/0/

SHARK TANK OF THE DAY
______________________

Somebody's unclear on a whole lot of concepts

Call from a client wakes up this IT pilot fish in the middle of the night: A key
application won't start, and it needs fixing, pronto. Turns out SQL Server is
seriously borked -- but that's not the only problem.

http://cwonline.computerworld.com/t/7972232/823929840/560906/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Omissions from the feature set of Windows RT are leaving analysts increasingly
skeptical that enterprises will gravitate toward tablets running the new forked
version of Windows. Is Windows RT on tablets DOA because it lacks needed
enterprise features?

http://cwonline.computerworld.com/t/7972232/823929840/560675/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7972232/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7972232/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/7972232/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/7972232/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7972232/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89Nzk3MjIzMg%3d%3d&x=c34244a1

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7972232/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7972232/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7972232/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 11:44 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive