Computerworld Security: April 18, 2012
===============================================================
Mind the Byte seeks secure clouds to transmit research
Pharmaceutical and chemical research firm Mind the Byte is using vCider, which
aims to take the sting out of managing and securing virtual private clouds
across different infrastructure providers. Insider (registration required)
http://cwonline.computerworld.com/t/7961542/823929835/559972/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Brocade Communications~~~~~~~~~~~~~~~~~~~~~
Is Cloud the Answer to Federal IT Savings?
In this eGuide, Computerworld and its sister publications CIO and Network World
have collected interviews and articles that cover some of the biggest issues
faced by federal agency IT departments today. Read on to learn about the
technology challenges the U.S. government is facing, and how some agencies are
dealing with them.
http://cwonline.computerworld.com/t/7961542/823929835/559973/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Privacy watchdog, lawmaker push for Google probe
http://cwonline.computerworld.com/t/7961542/823929835/559974/0/
2. Hackers ramp up attacks against Tibetan activists
http://cwonline.computerworld.com/t/7961542/823929835/559975/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: EMC~~~~~~~~~~~~~~~~~~~~~
Intelligence-Driven Information Security
New SBIC Report sponsored by RSA: Getting Ahead of Advanced Threats – Achieving
Intelligence-Driven Information Security. Get insights on developing real-time
knowledge on threats in order to prevent, detect, &predict attacks, make risk
decisions, optimize defensive strategies & enable action.
http://cwonline.computerworld.com/t/7961542/823929835/559976/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Privacy watchdog, lawmaker push for Google probe
Privacy groups and lawmakers are calling for a new and broader investigation
into Google and its privacy practices after the U.S. Federal Communications
Commission announced that it had found no evidence that the company broke
eavesdropping laws.
http://cwonline.computerworld.com/t/7961542/823929835/559974/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Oracle~~~~~~~~~~~~~~~~~~~~~
Copying Sensitive Data Into Non-Production Environments
Download this paper to learn data masking best practices and enable your
organization to safely use production data for development, testing, and sharing
with out-source or off-shore partners, without risking a sensitive data breach.
http://cwonline.computerworld.com/t/7961542/823929835/559977/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Hackers ramp up attacks against Tibetan activists
Hackers are ramping up their attacks against Tibetan activists and are using
increasingly sophisticated techniques to deliver malware, according to
researchers from security firms FireEye and Trend Micro.
http://cwonline.computerworld.com/t/7961542/823929835/559975/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.
http://cwonline.computerworld.com/t/7961542/823929835/558670/0/
CALL FOR ENTRIES -- COMPUTERWORLD'S BUSINESS INTELLIGENCE BEST IN CLASS 2012
If your organization's BI project is innovative, has positively impacted your
business and has produced ROI, then we want to see your case study!
In our upcoming Aug. 27 issue, we will showcase a select group of the biggest
(and most fascinating) business decisions to which BI has contributed. Case
study submissions will be accepted now through April 27. Submit your nomination
here:
http://cwonline.computerworld.com/t/7961542/823929835/558910/0/
SHARK TANK OF THE DAY
______________________
He learned, but the company didn't
It's the 1990s, and this pilot fish works at a company that produces
industrial-control computer systems and is spread over three buildings connected
by corridors -- one of which is a little different.
http://cwonline.computerworld.com/t/7961542/823929835/559971/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
More than 600,000 Macs have been infected with a new version of the Flashback
Trojan horse that's being installed on people's computers with the help of Java
exploits. How does this infection affect Apple's reputation for security?
http://cwonline.computerworld.com/t/7961542/823929835/559457/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/7961542/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/7961542/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/7961542/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/7961542/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7961542/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03OTYxNTQy&x=b3815e4b
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7961542/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7961542/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7961542/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
0 comments:
Post a Comment