Computerworld Security: July 18, 2012
===============================================================
For BYOD Best Practices, Secure Data, Not Devices
IT organizations are justifiably concerned about the security risks inherent in
bringing your own device (BYOD). Many are turning to mobile device management
(MDM) products and services to address the problem. But a number of mobile
security vendors believe organizations are focusing the device when they should
be focusing on the data.
http://cwonline.computerworld.com/t/8116283/823929835/571541/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco~~~~~~~~~~~~~~~~~~~~~
Webcast Demonstrates New Collaboration Advances
An insightful webcast demonstrates how you can harness the power of
people-centric collaboration in today's post-PC world. You'll learn about new
collaboration tools and technologies and witness firsthand why they're making
the experience more immersive and more mobile, in boardrooms, bistros, and
everywhere in between. Watch the webcast today.
http://cwonline.computerworld.com/t/8116283/823929835/571536/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Judge dismisses privacy lawsuit against LinkedIn
http://cwonline.computerworld.com/t/8116283/823929835/571542/0/
2. Mahdi cyberespionage malware infects computers in Iran, Israel, other Middle Eastern countries
http://cwonline.computerworld.com/t/8116283/823929835/571543/0/
3. Darlene Storm: Black Hat: Hacking iris recognition systems
http://cwonline.computerworld.com/t/8116283/823929835/571544/0/
4. Grum botnet still alive after suffering significant blow
http://cwonline.computerworld.com/t/8116283/823929835/571545/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: FileMaker, Inc~~~~~~~~~~~~~~~~~~~~~
Create, deploy and manage custom business apps for iPad
The FileMaker Platform is a complete software suite to create, deploy, and
manage custom business apps for iPad and iPhone. Design and build stunning iOS
apps. Integrate mobile apps into existing enterprise systems. Deploy and
instantly update your apps. Secure your apps with industry-standard
authentication.
http://cwonline.computerworld.com/t/8116283/823929835/569239/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Judge dismisses privacy lawsuit against LinkedIn
A federal judge dismissed a class-action lawsuit against LinkedIn that alleged
the social media network violated provisions of the Stored Communications Act
(SCA) when it disclosed the IDs and browsing histories of LinkedIn users to
advertising companies.
http://cwonline.computerworld.com/t/8116283/823929835/571542/0/
Mahdi cyberespionage malware infects computers in Iran, Israel, other Middle Eastern countries
A piece of malware called Mahdi or Madi has been used to spy on hundreds of
targets from Iran, Israel and a few other Middle Eastern countries during the
past eight months, according to researchers from security vendors Seculert and
Kaspersky Lab.
http://cwonline.computerworld.com/t/8116283/823929835/571543/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~
Improving Governance, Risk and Compliance
In this webcast you'll learn how your organization can become more responsive to
financial market challenges while reassuring decision makers the accuracy of
execution.
http://cwonline.computerworld.com/t/8116283/823929835/571546/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ddf76427
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Black Hat: Hacking iris recognition systems
You've undoubtedly seen iris scanners being tricked by some high-tech
contact or even via a scavenged eyeball in action/adventure or thriller movies
when a secret agent or criminal wants to break into a vault or other high tech
facility, but at the upcoming Black Hat USA hacking conference, security
researcher Javier Galbally will talk about a new vulnerability to attack iris
recognition systems. This seems interesting from a security and a privacy point
of view, but especially thought-provoking in light of the FBI's plans
to test a database "for searching iris scans nationwide to more
quickly track criminals."
http://cwonline.computerworld.com/t/8116283/823929835/571544/0/
Grum botnet still alive after suffering significant blow
One of the world's most active spam botnets -- Grum -- was crippled after two of
its command and control (CnC) servers hosted in the Netherlands were taken down,
according to researchers from security firm FireEye.
http://cwonline.computerworld.com/t/8116283/823929835/571545/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PREMIER 100 -- CALL FOR NOMINATIONS
Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:
http://cwonline.computerworld.com/t/8116283/823929835/566534/0/
SHARK TANK OF THE DAY
______________________
Takin' care of business
This IT pilot fish working for a big hotel chain gets a call and several emails
from a new hotel one afternoon -- and no wonder, because the network has all but
collapsed -- so guests can't be checked in and keys can't be made.
http://cwonline.computerworld.com/t/8116283/823929835/571135/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Why are smaller tablets likely to dominate the tablet market?
http://cwonline.computerworld.com/t/8116283/823929835/570428/0/
COMPUTERWORLD'S IT SALARY SURVEY 2012
A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.
http://cwonline.computerworld.com/t/8116283/823929835/558670/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8116283/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8116283/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8116283/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8116283/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8116283/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MTE2Mjgz&x=e4284b04
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8116283/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8116283/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8116283/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, July 18, 2012
For BYOD Best Practices, Secure Data, Not Devices
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:59 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment