Wednesday, August 29, 2012

Why passwords are failing us -- still!

Computerworld Security: Issues and Trends: August 29, 2012
===============================================================

INSIDER: Why passwords are failing us -- still!

Three decades into the digital revolution, passwords are still complicated,
ineffective and a drain on IT's resources. What gives? (Insider - free
registration required.)
http://cwonline.computerworld.com/t/8200060/823929840/578460/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed~~~~~~~~~~~~~~~~~~~~~

5 Principles Behind IT Infrastructure Redesign

Learn how to be prepared to adapt your environment in a way that supports
distributed employees, anytime anywhere collaboration and the need for business
continuity during a disaster.

http://cwonline.computerworld.com/t/8200060/823929840/578461/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=36d9dadb

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. IT's 9 biggest security threats
http://cwonline.computerworld.com/t/8200060/823929840/578462/0/

2. Security Manager's Journal: Closing off a hole in Outlook
http://cwonline.computerworld.com/t/8200060/823929840/578463/0/

3. Crisis malware infects VMware virtual machines, researchers say
http://cwonline.computerworld.com/t/8200060/823929840/578464/0/

4. 'Big security' a natural, necessary extension of big data
http://cwonline.computerworld.com/t/8200060/823929840/578465/0/

5. Are biometric ID tools evil?
http://cwonline.computerworld.com/t/8200060/823929840/578466/0/

6. Facial recognition may need regulating
http://cwonline.computerworld.com/t/8200060/823929840/578467/0/

7. Sinister new breed of malware growing
http://cwonline.computerworld.com/t/8200060/823929840/578468/0/

8. INSIDER: Are your security professionals qualified?
http://cwonline.computerworld.com/t/8200060/823929840/578469/0/

9. New NIST encryption guidelines may force agencies to replace old websites
http://cwonline.computerworld.com/t/8200060/823929840/578470/0/

10. Businesses should press software vendors to meet new Microsoft encryption requirements
http://cwonline.computerworld.com/t/8200060/823929840/578471/0/

11. How to configure Dropbox's two-step authentication
http://cwonline.computerworld.com/t/8200060/823929840/578472/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Dell~~~~~~~~~~~~~~~~~~~~~

Management Madness: How to Manage Mobile Devices

There are six major mobile operating systems in use now and each one offers its
own set of security and management challenges. The resources in this Mobility
KnowledgeVault will help you keep these devices secure on the corporate network
with expert tips on management tools, endpoint security software, increasing
application support and more.

http://cwonline.computerworld.com/t/8200060/823929840/578473/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6a5d4ab4

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IT's 9 biggest security threats

Hacking has evolved from one-person crime of opportunity to an open market of
sophisticated malware backed by crime syndicates and money launderers.
http://cwonline.computerworld.com/t/8200060/823929840/578462/0/

Security Manager's Journal: Closing off a hole in Outlook

With Outlook Anywhere, users can download their mail to untrusted PCs and leave
sensitive documents behind.
http://cwonline.computerworld.com/t/8200060/823929840/578463/0/

Crisis malware infects VMware virtual machines, researchers say

The Windows version of Crisis, a piece of malware discovered in July, can infect
VMware virtual machine images, Windows Mobile devices and removable USB drives,
according to researchers from antivirus vendor Symantec.
http://cwonline.computerworld.com/t/8200060/823929840/578464/0/

'Big security' a natural, necessary extension of big data

Big data is poised to grow well beyond the enterprise -- and anything we can
imagine today. Think of how the assembly line changed the automobile and,
consequently, our lives. Keeping big data secure will require an equally
innovative approach. CIO.com columnist Bernard Golden calls it 'big security,'
and he doesn't think the industry is ready for it yet.
http://cwonline.computerworld.com/t/8200060/823929840/578465/0/

Are biometric ID tools evil?

Fingerprint readers, iris scanners, palm vein scanners, facial recognition
systems and more -- biometric ID tools are going mainstream. But will the
mainstream go biometric?
http://cwonline.computerworld.com/t/8200060/823929840/578466/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Teradata~~~~~~~~~~~~~~~~~~~~~

The Heat Is On: Making Smarter Decisions Faster

The heat is on for organizations to integrate and smartly manage the gamut of
data temperature
to dramatically speed up their decision making capabilities and boost their
competitive advantage. Learn about one hybrid storage solution that provides the
platform to make smarter decisions at hyper speeds.

http://cwonline.computerworld.com/t/8200060/823929840/578474/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0de104fd

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Facial recognition may need regulating

Congress may need to pass a law to limit the way government agencies and private
companies use facial recognition technology to identify people, a U.S. senator
said recently.
http://cwonline.computerworld.com/t/8200060/823929840/578467/0/

Sinister new breed of malware growing

Malware attacks seem to be evolving. Traditional viruses, Trojan horses, botnets
and phishing attacks are still a threat, but the next-generation malware takes
insidious to a whole new level. Thankfully, there's a silver lining as well.
http://cwonline.computerworld.com/t/8200060/823929840/578468/0/

INSIDER: Are your security professionals qualified?

Many don't know what they don't know. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/8200060/823929840/578469/0/

New NIST encryption guidelines may force agencies to replace old websites

Next month the National Institute of Standards and Technology plans to put out
for public review its draft for a new government encryption standard that, when
finalized, is going to compel federal agencies with older websites to replace
them.
http://cwonline.computerworld.com/t/8200060/823929840/578470/0/

Businesses should press software vendors to meet new Microsoft encryption requirements

Businesses should start leaning on vendors now to upgrade applications that use
less than 1,024-bit encryption before it's too late.
http://cwonline.computerworld.com/t/8200060/823929840/578471/0/

How to configure Dropbox's two-step authentication

Following in the footsteps of Google and other services, Dropbox has enabled
two-factor authentication to bring enhanced security to its users.
http://cwonline.computerworld.com/t/8200060/823929840/578472/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or
other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld
has launched its annual search for technology professionals who have
demonstrated leadership in their organizations through the use of information
technology and have the strategic vision to align IT with business goals.
Nominations are being collected now through August 29, 2012. Nominate an IT
leader today:

http://cwonline.computerworld.com/t/8200060/823929840/566534/0/

SHARK TANK OF THE DAY
______________________

Broken, redefined

This pilot fish's employer provides IT services to city governments, so it's no
surprise when he gets a call from one client's water department. The problem,
according to the billing manager: "The system is broken."

http://cwonline.computerworld.com/t/8200060/823929840/578382/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

While Samsung and Apple thrive in the overall smartphone market, the situation
is uncertain, perhaps dire, for several cell-phone vendors, including Research
In Motion, Nokia and Motorola. Which of the smartphone rivals is most
endangered?

http://cwonline.computerworld.com/t/8200060/823929840/575015/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/8200060/823929840/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8200060/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8200060/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/8200060/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/8200060/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8200060/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODIwMDA2MA%3d%3d&x=f54b9ecd

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8200060/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8200060/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8200060/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:19 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive