Computerworld Security: November 14, 2012
===============================================================
Adobe investigates alleged customer data breach
Adobe said Wednesday it is investigating the release of 230 names, email
addresses and encrypted passwords claimed to have been stolen from a company
database.
http://cwonline.computerworld.com/t/8320747/823929835/590296/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Sophos~~~~~~~~~~~~~~~~~~~~~
Sophos Mobile Security Toolkit
Get resources to help you secure smartphones and tablets plus educate your users
on mobile security risks.
http://cwonline.computerworld.com/t/8320747/823929835/590297/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Microsoft patches critical flaws in Windows 8, Windows RT
http://cwonline.computerworld.com/t/8320747/823929835/590298/0/
2. INSIDER: We're missing out on the value of security awareness
http://cwonline.computerworld.com/t/8320747/823929835/590299/0/
3. Employees Engage in Rogue Cloud Use Regardless of Security Policies
http://cwonline.computerworld.com/t/8320747/823929835/590300/0/
4. Researcher to present Windows Phone 8 malware at MalCon
http://cwonline.computerworld.com/t/8320747/823929835/590301/0/
5. NSA: Looking for a few good cybersecurity professionals
http://cwonline.computerworld.com/t/8320747/823929835/590302/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verizon~~~~~~~~~~~~~~~~~~~~~
Leading the Revolution of Device Independence
As employees bring their own devices to work, employers must respond with
effective strategies to secure and manage a plethora of new devices containing
business-critical data. A Computerworld QuickPoll survey found approximately
four in 10 smartphones and tablet devices in the enterprise are owned by
employees.
http://cwonline.computerworld.com/t/8320747/823929835/590303/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3f92d4ac
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft patches critical flaws in Windows 8, Windows RT
Microsoft today patched 19 vulnerabilities in Windows, Internet Explorer 9,
Excel and the .Net development framework, including four flaws in the
just-released Windows 8 and its tablet spin-off Windows RT.
http://cwonline.computerworld.com/t/8320747/823929835/590298/0/
INSIDER: We're missing out on the value of security awareness
When a program is ineffective, the problem is usually that the training wasn't
designed in a way that would result in changes in behavior. (Insider;
registration required)
http://cwonline.computerworld.com/t/8320747/823929835/590299/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: APC by Schneider Electric~~~~~~~~~~~~~~~~~~~~~
Strategies for Managing Distributed IT Environments
Protecting your network architecture continues to be extremely critical.
Distributed networking and computing spaces often times go unmanaged. Learn more
about the importance of managing these distributed IT spaces including
strategies for maintaining availability and energy cost savings opportunities.
http://cwonline.computerworld.com/t/8320747/823929835/590304/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=54e9c550
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Employees Engage in Rogue Cloud Use Regardless of Security Policies
Studies show that employees are engaging in rogue use of the cloud, even when IT
organizations say they have clear formal cloud policies and penalties for
violation of the policies.
http://cwonline.computerworld.com/t/8320747/823929835/590300/0/
Researcher to present Windows Phone 8 malware at MalCon
A 16-year-old security researcher from India plans to present a malware
application for Windows Phone 8 at the upcoming MalCon security conference in
New Delhi, India, on Nov. 24.
http://cwonline.computerworld.com/t/8320747/823929835/590301/0/
NSA: Looking for a few good cybersecurity professionals
At a time when cyberattacks on America's critical infrastructure have increased
17-fold (between 2009 and 2011), the need for highly trained cybersecurity
professionals is acute. However, 83% of federal hiring managers in a recent
survey said it was extremely difficult to find well-trained cybersecurity
professionals and a projected shortfall of 20,000 to more than 40,000 people is
expected in the years to come.
http://cwonline.computerworld.com/t/8320747/823929835/590302/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HOW DOES YOUR SALARY COMPARE WITH YOUR IT PEERS?
Computerworld's 27th Annual Salary Survey will feature the latest IT salary
trends and advice on where to find the best-paying jobs. This year's survey
participants can enter a drawing to win one of 5 new Google 16GB Nexus 7 tablets
with Wi-Fi! The drawing is open to legal U.S. residents, age 18 or older. Take
our annual IT Salary Survey today!
http://cwonline.computerworld.com/t/8320747/823929835/589225/0/
BEST PLACES TO WORK -- CALL FOR NOMINATIONS
Is your IT department a great place to work? Our 20th annual Best Places to Work
in IT report will honor 100 organizations that offer great benefits, salaries
and opportunities for training and advancement, as well as interesting projects
and a flexible and diverse work environment. Nominate an organization now
through Dec. 13, 2012:
http://cwonline.computerworld.com/t/8320747/823929835/566535/0/
SHARK TANK OF THE DAY
______________________
What IT doesn't know won't hurt it, right?
This business-products distributor receives payments from customers through a
bank's service, and that works almost perfectly. Then someone fixes a bug.
http://cwonline.computerworld.com/t/8320747/823929835/590305/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Big data, analytics and mobile apps are enabling smaller political campaigns and
advocacy groups to be more effective when it comes to winning over voters and
raising money. Is data mining by candidates a privacy concern?
http://cwonline.computerworld.com/t/8320747/823929835/588602/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8320747/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8320747/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8320747/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8320747/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8320747/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MzIwNzQ3&x=1b622b9b
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8320747/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8320747/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8320747/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, November 14, 2012
Adobe investigates alleged customer data breach
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:18 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment