Wednesday, July 18, 2012

For BYOD Best Practices, Secure Data, Not Devices

Computerworld Security: July 18, 2012
===============================================================

For BYOD Best Practices, Secure Data, Not Devices

IT organizations are justifiably concerned about the security risks inherent in
bringing your own device (BYOD). Many are turning to mobile device management
(MDM) products and services to address the problem. But a number of mobile
security vendors believe organizations are focusing the device when they should
be focusing on the data.
http://cwonline.computerworld.com/t/8116283/823929835/571541/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco~~~~~~~~~~~~~~~~~~~~~

Webcast Demonstrates New Collaboration Advances

An insightful webcast demonstrates how you can harness the power of
people-centric collaboration in today's post-PC world. You'll learn about new
collaboration tools and technologies and witness firsthand why they're making
the experience more immersive and more mobile, in boardrooms, bistros, and
everywhere in between. Watch the webcast today.

http://cwonline.computerworld.com/t/8116283/823929835/571536/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Judge dismisses privacy lawsuit against LinkedIn
http://cwonline.computerworld.com/t/8116283/823929835/571542/0/

2. Mahdi cyberespionage malware infects computers in Iran, Israel, other Middle Eastern countries
http://cwonline.computerworld.com/t/8116283/823929835/571543/0/

3. Darlene Storm: Black Hat: Hacking iris recognition systems
http://cwonline.computerworld.com/t/8116283/823929835/571544/0/

4. Grum botnet still alive after suffering significant blow
http://cwonline.computerworld.com/t/8116283/823929835/571545/0/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: FileMaker, Inc~~~~~~~~~~~~~~~~~~~~~

Create, deploy and manage custom business apps for iPad

The FileMaker Platform is a complete software suite to create, deploy, and
manage custom business apps for iPad and iPhone. Design and build stunning iOS
apps. Integrate mobile apps into existing enterprise systems. Deploy and
instantly update your apps. Secure your apps with industry-standard
authentication.

http://cwonline.computerworld.com/t/8116283/823929835/569239/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Judge dismisses privacy lawsuit against LinkedIn

A federal judge dismissed a class-action lawsuit against LinkedIn that alleged
the social media network violated provisions of the Stored Communications Act
(SCA) when it disclosed the IDs and browsing histories of LinkedIn users to
advertising companies.
http://cwonline.computerworld.com/t/8116283/823929835/571542/0/

Mahdi cyberespionage malware infects computers in Iran, Israel, other Middle Eastern countries

A piece of malware called Mahdi or Madi has been used to spy on hundreds of
targets from Iran, Israel and a few other Middle Eastern countries during the
past eight months, according to researchers from security vendors Seculert and
Kaspersky Lab.
http://cwonline.computerworld.com/t/8116283/823929835/571543/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

Improving Governance, Risk and Compliance

In this webcast you'll learn how your organization can become more responsive to
financial market challenges while reassuring decision makers the accuracy of
execution.

http://cwonline.computerworld.com/t/8116283/823929835/571546/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ddf76427

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Darlene Storm: Black Hat: Hacking iris recognition systems


You've undoubtedly seen iris scanners being tricked by some high-tech
contact or even via a scavenged eyeball in action/adventure or thriller movies
when a secret agent or criminal wants to break into a vault or other high tech
facility, but at the upcoming Black Hat USA hacking conference, security
researcher Javier Galbally will talk about a new vulnerability to attack iris
recognition systems. This seems interesting from a security and a privacy point
of view, but especially thought-provoking in light of the FBI's plans
to test a database "for searching iris scans nationwide to more
quickly track criminals."
http://cwonline.computerworld.com/t/8116283/823929835/571544/0/

Grum botnet still alive after suffering significant blow

One of the world's most active spam botnets -- Grum -- was crippled after two of
its command and control (CnC) servers hosted in the Netherlands were taken down,
according to researchers from security firm FireEye.
http://cwonline.computerworld.com/t/8116283/823929835/571545/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8116283/823929835/566534/0/

SHARK TANK OF THE DAY
______________________

Takin' care of business

This IT pilot fish working for a big hotel chain gets a call and several emails
from a new hotel one afternoon -- and no wonder, because the network has all but
collapsed -- so guests can't be checked in and keys can't be made.

http://cwonline.computerworld.com/t/8116283/823929835/571135/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Why are smaller tablets likely to dominate the tablet market?

http://cwonline.computerworld.com/t/8116283/823929835/570428/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8116283/823929835/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8116283/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8116283/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8116283/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8116283/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8116283/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MTE2Mjgz&x=e4284b04

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8116283/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8116283/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8116283/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:59 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive