Tuesday, November 13, 2012

What's your Total Cost of Risk (TCOR)?

Computerworld Security: November 13, 2012
===============================================================

What's your Total Cost of Risk (TCOR)?

If you don't know, you need a better connection to your company's risk managers,
who measure risk by what can be insured and what it costs to do so. While the
measurement of operational risks is still a bit of a puzzle for CSOs, risk
managers have used TCOR for ages.
http://cwonline.computerworld.com/t/8318735/823929835/590128/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

Assess the impact of a cyber attack on your business

You can't build an effective defense against cyber attacks on ballpark numbers.
Get the true cost of downtime for your business based on your IT infrastructure
from Prolexic's DDoS Downtime Calculator. Then get best practice recommendations
from the new white paper, "Strategies for surviving a cyber attack this holiday
season."

http://cwonline.computerworld.com/t/8318735/823929835/590129/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Cyberwarfare evolves faster than rules of engagement
http://cwonline.computerworld.com/t/8318735/823929835/590130/0/

2. Researchers identify year-long cyberespionage effort against Israelis, Palestinians
http://cwonline.computerworld.com/t/8318735/823929835/590131/0/

3. Pirate Bay co-founder suspected of serious fraud and another data intrusion
http://cwonline.computerworld.com/t/8318735/823929835/590132/0/

4. Anti-virus pioneer John McAfee reportedly wanted for murder in Belize
http://cwonline.computerworld.com/t/8318735/823929835/590133/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Sourcefire, Inc.~~~~~~~~~~~~~~~~~~~~~

How to Protect Against Hackers Targeting Applications

Read "The Five Key Benefits of Application Control and How to Achieve Them," by
Sourcefire security experts, to learn:
• Why application control is so critical to your network security
• How to encourage productivity while minimizing risks
• Must haves when evaluating application control solutions

http://cwonline.computerworld.com/t/8318735/823929835/590134/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fc4594d5

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyberwarfare evolves faster than rules of engagement

As the rhetoric heats up over cyberwar -- including warnings that attacks on the
U.S. are imminent and alarms that the U.S. has escalated the risk via malware
attacks on Iran's nuclear program -- the rules of engagement are missing in
action.
http://cwonline.computerworld.com/t/8318735/823929835/590130/0/

Researchers identify year-long cyberespionage effort against Israelis, Palestinians

The recent cyberattack that infected Israeli police computers with malware was
likely part of a year-long cyberespionage operation with targets in Israel and
the Palestinian territories, according to security researchers from antivirus
vendor Norman.
http://cwonline.computerworld.com/t/8318735/823929835/590131/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

How to Take Business Analytics to the Next Level

By viewing this webcast you will learn how you can implement an effective BA
strategy that will deliver maximum strategic value to your company.

http://cwonline.computerworld.com/t/8318735/823929835/590135/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7d060493

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pirate Bay co-founder suspected of serious fraud and another data intrusion

Swedish authorities now suspects Pirate Bay co-founder Gottfrid Svartholm Warg
of serious fraud and another data intrusion in addition to the alleged hacking
of IT company Logica that led to his arrest, public prosecutor Henrik Olin said
Monday.
http://cwonline.computerworld.com/t/8318735/823929835/590132/0/

Anti-virus pioneer John McAfee reportedly wanted for murder in Belize

Anti-virus pioneer John McAfee is reportedly wanted for murder in Belize after
allegedly gunning down a U.S. citizen in San Pedro Town on Sunday.
http://cwonline.computerworld.com/t/8318735/823929835/590133/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

HOW DOES YOUR SALARY COMPARE WITH YOUR IT PEERS?

Computerworld's 27th Annual Salary Survey will feature the latest IT salary
trends and advice on where to find the best-paying jobs. This year's survey
participants can enter a drawing to win one of 5 new Google 16GB Nexus 7 tablets
with Wi-Fi! The drawing is open to legal U.S. residents, age 18 or older. Take
our annual IT Salary Survey today!

http://cwonline.computerworld.com/t/8318735/823929835/589225/0/

BEST PLACES TO WORK -- CALL FOR NOMINATIONS

Is your IT department a great place to work? Our 20th annual Best Places to Work
in IT report will honor 100 organizations that offer great benefits, salaries
and opportunities for training and advancement, as well as interesting projects
and a flexible and diverse work environment. Nominate an organization now
through Dec. 13, 2012:

http://cwonline.computerworld.com/t/8318735/823929835/566535/0/

SHARK TANK OF THE DAY
______________________

Clearly, too much IT insight and not enough snark

Pilot fish on the IT help desk at this manufacturing company has just about had
it with one particular user behavior -- and it happens almost every week.

http://cwonline.computerworld.com/t/8318735/823929835/590126/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Big data, analytics and mobile apps are enabling smaller political campaigns and
advocacy groups to be more effective when it comes to winning over voters and
raising money. Is data mining by candidates a privacy concern?

http://cwonline.computerworld.com/t/8318735/823929835/588602/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8318735/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8318735/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8318735/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8318735/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8318735/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04MzE4NzM1&x=f458a721

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8318735/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8318735/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8318735/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:12 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive