Wednesday, June 20, 2012

BYOD exposes the perils of cloud storage

Computerworld Security: Issues and Trends: June 20, 2012
===============================================================

BYOD exposes the perils of cloud storage

As more and more companies adopt BYOD policies, IT managers are taking steps to
prevent employees from using cloud-based consumer storage services with their
personal devices.
http://cwonline.computerworld.com/t/8065723/823929840/567864/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Cisco~~~~~~~~~~~~~~~~~~~~~

Evolve Customer Care with Collaboration

Using collaboration technology to improve customer service gives your company an
opportunity to evolve beyond traditional service models to create better
customer relationships. While the telephone will always be an option, many
customers want experiences where chat, social media, video and self-service are
also part of the norm.

http://cwonline.computerworld.com/t/8065723/823929840/565917/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Researchers set new cryptanalysis world record for pairing-based cryptography
http://cwonline.computerworld.com/t/8065723/823929840/567865/0/

2. U.S. lawmakers call for online, mobile privacy legislation
http://cwonline.computerworld.com/t/8065723/823929840/567866/0/

3. Data breach? Virtual bounty hunters will hunt it down
http://cwonline.computerworld.com/t/8065723/823929840/567867/0/

4. LinkedIn hit with lawsuit over massive data breach
http://cwonline.computerworld.com/t/8065723/823929840/567868/0/

5. INSIDER: Authentication and Authorization: A Deep Dive Report
http://cwonline.computerworld.com/t/8065723/823929840/567869/0/

6. Scot Finnie: Stuxnet was a wake-up call, but don't fall back asleep
http://cwonline.computerworld.com/t/8065723/823929840/567870/0/

7. Darlene Storm: Downloading of software updates for lifesaving medical devices proves very dangerous
http://cwonline.computerworld.com/t/8065723/823929840/567871/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Comcast~~~~~~~~~~~~~~~~~~~~~

Bank Raises the Bar on Service Delivery with Comcast

Read this exclusive case study to learn how Comcast and Eastern Bank teamed to
maintain a secure, reliable network infrastructure for transferring and
protecting an enormous amount of data, including customers' bank account and
credit card information, financial transactions, mortgage payments and payroll
processing for their businesses.

http://cwonline.computerworld.com/t/8065723/823929840/567872/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fc132a62

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Researchers set new cryptanalysis world record for pairing-based cryptography

Researchers from Fujitsu Laboratories, Japan's National Institute of Information
and Communications Technology (NICT) and Kyushu University have set a new
cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a
pairing-based cryptography system, Japanese IT services provider Fujitsu said
Monday.
http://cwonline.computerworld.com/t/8065723/823929840/567865/0/

U.S. lawmakers call for online, mobile privacy legislation

The U.S. Congress doesn't need to take major steps to protect the privacy of Web
and mobile users, because self-policing efforts are generally working, the CEO
of TRUSTe told lawmakers on Tuesday.
http://cwonline.computerworld.com/t/8065723/823929840/567866/0/

Data breach? Virtual bounty hunters will hunt it down

Security expert Dan Clements is building a virtual "lost and found" box for
data, a concept he hopes companies suffering from data breaches will embrace to
find out just how bad the damage is.
http://cwonline.computerworld.com/t/8065723/823929840/567867/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Box~~~~~~~~~~~~~~~~~~~~~

Disaster Recovery Services Providers Evaluation

Improvements in disaster recovery plans and broad business continuity strategies
are top-of-mind concerns for leading enterprises today and recovery time is now
measured in hours and minutes not days. These key insights are discussed in the
2010 Forrester Wave Report.

http://cwonline.computerworld.com/t/8065723/823929840/567873/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8b51474c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


LinkedIn hit with lawsuit over massive data breach

LinkedIn has been hit with a potential class-action lawsuit alleging it failed
to meet "industry standard" security practices in connection with a massive data
breach earlier this month, according to court documents.
http://cwonline.computerworld.com/t/8065723/823929840/567868/0/

INSIDER: Authentication and Authorization: A Deep Dive Report

Find out how to implement authentication and authorization security controls in
your company, with help from InfoWorld's expert guide
http://cwonline.computerworld.com/t/8065723/823929840/567869/0/

Scot Finnie: Stuxnet was a wake-up call, but don't fall back asleep

It's clear that U.S. businesses and infrastructure operators haven't even begun
to prepare to defend against cyber-espionage and sabotage.
http://cwonline.computerworld.com/t/8065723/823929840/567870/0/

Darlene Storm: Downloading of software updates for lifesaving medical devices proves very dangerous

When it comes to security, one of the scariest things out there sounds like
science fiction and pertains to hacking implantable medical devices. They
are vulnerable to lethal attacks and there are continued warnings that
exploiting these wireless medical devices will eventually cost someone their
life. Here's a slightly different take on the scenario; you've heard
of drive-by-downloads that can infect a machine with malware without the user
agreeing to the automatic download, but how about healthcare serving up malware
in software updates for medical devices such as ventilators?
http://cwonline.computerworld.com/t/8065723/823929840/567871/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8065723/823929840/566534/0/

SHARK TANK OF THE DAY
______________________

The sad thing is, there's a logic to this

It's a few years back, and this IT shop has taken advantage of the company's
long holiday break to convert the email system to Outlook -- and to make it
easier on users, there's a 'leave-behind' on every user's desk, explaining what
was done, how to access Outlook, and some other tips. But that won't necessarily
help.

http://cwonline.computerworld.com/t/8065723/823929840/567757/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The sophisticated cyber espionage malware known as 'Flame' was discovered after
computers within Iran's energy industry were wiped clean of data. Does the
Flame malware increase the odds of a cyberwar?

http://cwonline.computerworld.com/t/8065723/823929840/565666/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8065723/823929840/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8065723/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8065723/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/8065723/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/8065723/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8065723/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODA2NTcyMw%3d%3d&x=c76e407f

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8065723/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8065723/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8065723/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 9:35 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive