Computerworld Security: June 19, 2012
===============================================================
Data breach? Virtual bounty hunters will hunt it down
Security expert Dan Clements is building a virtual "lost and found" box for
data, a concept he hopes companies suffering from data breaches will embrace to
find out just how bad the damage is.
http://cwonline.computerworld.com/t/8061992/823929835/567605/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Cisco~~~~~~~~~~~~~~~~~~~~~
Evolve Customer Care with Collaboration
Using collaboration technology to improve customer service gives your company an
opportunity to evolve beyond traditional service models to create better
customer relationships. While the telephone will always be an option, many
customers want experiences where chat, social media, video and self-service are
also part of the norm.
http://cwonline.computerworld.com/t/8061992/823929835/565917/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Data in possible credit card breach appears to be old
http://cwonline.computerworld.com/t/8061992/823929835/567606/0/
2. Attack code published for two actively exploited flaws in Microsoft software
http://cwonline.computerworld.com/t/8061992/823929835/567607/0/
3. Governments should spend more to catch cybercriminals, researchers say
http://cwonline.computerworld.com/t/8061992/823929835/567608/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: FileMaker, Inc~~~~~~~~~~~~~~~~~~~~~
Create, deploy and manage custom business apps for iPad
The FileMaker Platform is a complete software suite to create, deploy, and
manage custom business apps for iPad and iPhone. Design and build stunning iOS
apps. Integrate mobile apps into existing enterprise systems. Deploy and
instantly update your apps. Secure your apps with industry-standard
authentication.
http://cwonline.computerworld.com/t/8061992/823929835/563177/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Data in possible credit card breach appears to be old
A batch of names, addresses, emails and phone numbers of credit card customers
around the world released on Monday indicates a breach of a payment processor,
but the data appears old.
http://cwonline.computerworld.com/t/8061992/823929835/567606/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Box~~~~~~~~~~~~~~~~~~~~~
Disaster Recovery Services Providers Evaluation
Improvements in disaster recovery plans and broad business continuity strategies
are top-of-mind concerns for leading enterprises today and recovery time is now
measured in hours and minutes not days. These key insights are discussed in the
2010 Forrester Wave Report.
http://cwonline.computerworld.com/t/8061992/823929835/567609/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ff9b25ae
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attack code published for two actively exploited flaws in Microsoft software
Attack code for two actively exploited vulnerabilities in Microsoft software,
one of which has not yet been patched, was integrated into the open-source
Metasploit penetration testing framework.
http://cwonline.computerworld.com/t/8061992/823929835/567607/0/
Governments should spend more to catch cybercriminals, researchers say
Improving the ability of law enforcement agencies to catch cybercriminals should
be a priority when governments decide how their cybersecurity budgets get spent,
according to University of Cambridge security engineering professor Ross
Anderson.
http://cwonline.computerworld.com/t/8061992/823929835/567608/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PREMIER 100 -- CALL FOR NOMINATIONS
Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:
http://cwonline.computerworld.com/t/8061992/823929835/566534/0/
SHARK TANK OF THE DAY
______________________
You're welcome
Going through his email, this IT pilot fish sees that he's been BCC'd on a
message from a user to her bosses about her group's monthly stats -- and it
includes a nice little 'attaboy' for saving users hours of work.
http://cwonline.computerworld.com/t/8061992/823929835/567382/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
The sophisticated cyber espionage malware known as 'Flame' was discovered after
computers within Iran's energy industry were wiped clean of data. Does the
Flame malware increase the odds of a cyberwar?
http://cwonline.computerworld.com/t/8061992/823929835/565666/0/
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.
http://cwonline.computerworld.com/t/8061992/823929835/558670/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8061992/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8061992/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8061992/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8061992/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8061992/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MDYxOTky&x=83666e2f
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8061992/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8061992/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8061992/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, June 19, 2012
Data breach? Virtual bounty hunters will hunt it down
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:18 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment