Computerworld Security: Issues and Trends: June 20, 2012
===============================================================
BYOD exposes the perils of cloud storage
As more and more companies adopt BYOD policies, IT managers are taking steps to
prevent employees from using cloud-based consumer storage services with their
personal devices.
http://cwonline.computerworld.com/t/8065723/823929840/567864/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Cisco~~~~~~~~~~~~~~~~~~~~~
Evolve Customer Care with Collaboration
Using collaboration technology to improve customer service gives your company an
opportunity to evolve beyond traditional service models to create better
customer relationships. While the telephone will always be an option, many
customers want experiences where chat, social media, video and self-service are
also part of the norm.
http://cwonline.computerworld.com/t/8065723/823929840/565917/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Researchers set new cryptanalysis world record for pairing-based cryptography
http://cwonline.computerworld.com/t/8065723/823929840/567865/0/
2. U.S. lawmakers call for online, mobile privacy legislation
http://cwonline.computerworld.com/t/8065723/823929840/567866/0/
3. Data breach? Virtual bounty hunters will hunt it down
http://cwonline.computerworld.com/t/8065723/823929840/567867/0/
4. LinkedIn hit with lawsuit over massive data breach
http://cwonline.computerworld.com/t/8065723/823929840/567868/0/
5. INSIDER: Authentication and Authorization: A Deep Dive Report
http://cwonline.computerworld.com/t/8065723/823929840/567869/0/
6. Scot Finnie: Stuxnet was a wake-up call, but don't fall back asleep
http://cwonline.computerworld.com/t/8065723/823929840/567870/0/
7. Darlene Storm: Downloading of software updates for lifesaving medical devices proves very dangerous
http://cwonline.computerworld.com/t/8065723/823929840/567871/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Comcast~~~~~~~~~~~~~~~~~~~~~
Bank Raises the Bar on Service Delivery with Comcast
Read this exclusive case study to learn how Comcast and Eastern Bank teamed to
maintain a secure, reliable network infrastructure for transferring and
protecting an enormous amount of data, including customers' bank account and
credit card information, financial transactions, mortgage payments and payroll
processing for their businesses.
http://cwonline.computerworld.com/t/8065723/823929840/567872/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fc132a62
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Researchers set new cryptanalysis world record for pairing-based cryptography
Researchers from Fujitsu Laboratories, Japan's National Institute of Information
and Communications Technology (NICT) and Kyushu University have set a new
cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a
pairing-based cryptography system, Japanese IT services provider Fujitsu said
Monday.
http://cwonline.computerworld.com/t/8065723/823929840/567865/0/
U.S. lawmakers call for online, mobile privacy legislation
The U.S. Congress doesn't need to take major steps to protect the privacy of Web
and mobile users, because self-policing efforts are generally working, the CEO
of TRUSTe told lawmakers on Tuesday.
http://cwonline.computerworld.com/t/8065723/823929840/567866/0/
Data breach? Virtual bounty hunters will hunt it down
Security expert Dan Clements is building a virtual "lost and found" box for
data, a concept he hopes companies suffering from data breaches will embrace to
find out just how bad the damage is.
http://cwonline.computerworld.com/t/8065723/823929840/567867/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Box~~~~~~~~~~~~~~~~~~~~~
Disaster Recovery Services Providers Evaluation
Improvements in disaster recovery plans and broad business continuity strategies
are top-of-mind concerns for leading enterprises today and recovery time is now
measured in hours and minutes not days. These key insights are discussed in the
2010 Forrester Wave Report.
http://cwonline.computerworld.com/t/8065723/823929840/567873/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8b51474c
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
LinkedIn hit with lawsuit over massive data breach
LinkedIn has been hit with a potential class-action lawsuit alleging it failed
to meet "industry standard" security practices in connection with a massive data
breach earlier this month, according to court documents.
http://cwonline.computerworld.com/t/8065723/823929840/567868/0/
INSIDER: Authentication and Authorization: A Deep Dive Report
Find out how to implement authentication and authorization security controls in
your company, with help from InfoWorld's expert guide
http://cwonline.computerworld.com/t/8065723/823929840/567869/0/
Scot Finnie: Stuxnet was a wake-up call, but don't fall back asleep
It's clear that U.S. businesses and infrastructure operators haven't even begun
to prepare to defend against cyber-espionage and sabotage.
http://cwonline.computerworld.com/t/8065723/823929840/567870/0/
Darlene Storm: Downloading of software updates for lifesaving medical devices proves very dangerous
When it comes to security, one of the scariest things out there sounds like
science fiction and pertains to hacking implantable medical devices. They
are vulnerable to lethal attacks and there are continued warnings that
exploiting these wireless medical devices will eventually cost someone their
life. Here's a slightly different take on the scenario; you've heard
of drive-by-downloads that can infect a machine with malware without the user
agreeing to the automatic download, but how about healthcare serving up malware
in software updates for medical devices such as ventilators?
http://cwonline.computerworld.com/t/8065723/823929840/567871/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PREMIER 100 -- CALL FOR NOMINATIONS
Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:
http://cwonline.computerworld.com/t/8065723/823929840/566534/0/
SHARK TANK OF THE DAY
______________________
The sad thing is, there's a logic to this
It's a few years back, and this IT shop has taken advantage of the company's
long holiday break to convert the email system to Outlook -- and to make it
easier on users, there's a 'leave-behind' on every user's desk, explaining what
was done, how to access Outlook, and some other tips. But that won't necessarily
help.
http://cwonline.computerworld.com/t/8065723/823929840/567757/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
The sophisticated cyber espionage malware known as 'Flame' was discovered after
computers within Iran's energy industry were wiped clean of data. Does the
Flame malware increase the odds of a cyberwar?
http://cwonline.computerworld.com/t/8065723/823929840/565666/0/
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.
http://cwonline.computerworld.com/t/8065723/823929840/558670/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8065723/823929840/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8065723/823929840/311619/0/
Facebook: http://cwonline.computerworld.com/t/8065723/823929840/311620/0/
Twitter: http://cwonline.computerworld.com/t/8065723/823929840/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8065723/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODA2NTcyMw%3d%3d&x=c76e407f
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8065723/823929840/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8065723/823929840/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8065723/823929840/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, June 20, 2012
BYOD exposes the perils of cloud storage
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 9:35 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment