Computerworld Security: Issues and Trends: December 05, 2012
===============================================================
Security Manager's Journal: Can an enterprise run its security with Microsoft's tools?
Our company's desktop group is pushing to abandon enterprise-class tools for
built-in antivirus, firewall and encryption software from Microsoft. Is that any
way to run a business?
http://cwonline.computerworld.com/t/8354331/823929840/592776/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel® Xeon® processors~~~~~~~~~~~~~~~~~~~~~
BYOD in Education
This white paper can help you address the security and management of multiple
devices being introduced into your network. Read on and learn how to embrace a
BYOD.
http://cwonline.computerworld.com/t/8354331/823929840/592777/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7e0073cc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. The cybersecurity needs of the borderless enterprise
http://cwonline.computerworld.com/t/8354331/823929840/592778/0/
2. INSIDER: How CIOs are making security an enterprise necessity
http://cwonline.computerworld.com/t/8354331/823929840/592779/0/
3. Senate fails to advance cybersecurity bill
http://cwonline.computerworld.com/t/8354331/823929840/592780/0/
4. U.S. government needs cybersecurity doctrine, experts say
http://cwonline.computerworld.com/t/8354331/823929840/592781/0/
5. Security Manager's Journal: Tracking down rogue IT
http://cwonline.computerworld.com/t/8354331/823929840/592782/0/
6. When in China, don't leave your laptop alone
http://cwonline.computerworld.com/t/8354331/823929840/592783/0/
7. Kenneth Van Wyk: 'Tis the season to shop with care
http://cwonline.computerworld.com/t/8354331/823929840/592784/0/
8. Samsung printers contain hardcoded backdoor account, US-CERT warns
http://cwonline.computerworld.com/t/8354331/823929840/592785/0/
9. The (encryption) key to dealing with data insecurity
http://cwonline.computerworld.com/t/8354331/823929840/592786/0/
10. Mobile browser vulnerability lets hackers steal cloud computing time
http://cwonline.computerworld.com/t/8354331/823929840/592787/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Moovweb~~~~~~~~~~~~~~~~~~~~~
Creating the Right Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You
Need to Know Before You Get Started", get the insight you need to make an
educated decision on the move to mobile.
http://cwonline.computerworld.com/t/8354331/823929840/592788/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e930889f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The cybersecurity needs of the borderless enterprise
As the traditional security perimeter dissolves in a virtualized environment,
organizations need a new cybersecurity framework and architecture.
http://cwonline.computerworld.com/t/8354331/823929840/592778/0/
INSIDER: How CIOs are making security an enterprise necessity
Information security is often seen as more trouble and cost than it's worth.
Until it fails. How can CIOs truly make it part of enterprise risk management?
Insider: free registration required.
http://cwonline.computerworld.com/t/8354331/823929840/592779/0/
Senate fails to advance cybersecurity bill
The U.S. Senate failed to muster enough votes to move forward on the
Cybersecurity Act.
http://cwonline.computerworld.com/t/8354331/823929840/592780/0/
U.S. government needs cybersecurity doctrine, experts say
The U.S. government needs a comprehensive doctrine addressing cybersecurity
instead of the current patchwork of policies and agencies dealing with
cyberthreats, according to a group of experts.
http://cwonline.computerworld.com/t/8354331/823929840/592781/0/
Security Manager's Journal: Tracking down rogue IT
The CIO wants to know if rogue IT is a problem. 'Probably,' says our manager.
Now he better find out how bad it is.
http://cwonline.computerworld.com/t/8354331/823929840/592782/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Sourcefire, Inc.~~~~~~~~~~~~~~~~~~~~~
Next-Generation Firewall Product Analysis Report
The Sourcefire FirePOWER 8250 NGFW set a new standard in security effectiveness,
performance and value:
• 99% protection against all attacks
• 100% firewall enforcement
• 100% application control
• 100% identity/user awareness
• 10 Gbps real-world traffic throughput
• TCO of $33 per Mbps protected
http://cwonline.computerworld.com/t/8354331/823929840/592789/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=75b4c448
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
When in China, don't leave your laptop alone
If you travel to China or Russia, assume government or industry spooks will
steal your data and install spyware. Here's how to thwart them.
http://cwonline.computerworld.com/t/8354331/823929840/592783/0/
Kenneth Van Wyk: 'Tis the season to shop with care
With online holiday shopping on the rise, and mobile-device shopping coming into
its own, the need to be aware of the necessary security precautions has grown.
http://cwonline.computerworld.com/t/8354331/823929840/592784/0/
Samsung printers contain hardcoded backdoor account, US-CERT warns
Printers manufactured by Samsung have a backdoor administrator account hard
coded in their firmware that could enable attackers to change their
configuration, read their network information or stored credentials and access
sensitive information passed to them by users.
http://cwonline.computerworld.com/t/8354331/823929840/592785/0/
The (encryption) key to dealing with data insecurity
Valuable data stored in the cloud is sure to be a target. What can be done to
make it harder to steal?
http://cwonline.computerworld.com/t/8354331/823929840/592786/0/
Mobile browser vulnerability lets hackers steal cloud computing time
A novel technique based on MapReduce could let hackers hijack computing
resources used by cloud-based mobile browsers and use them anonymously,
according to security researchers from North Carolina State University and the
University of Oregon.
http://cwonline.computerworld.com/t/8354331/823929840/592787/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HOW DOES YOUR SALARY COMPARE WITH YOUR IT PEERS?
Computerworld's 27th Annual Salary Survey will feature the latest IT salary
trends and advice on where to find the best-paying jobs. This year's survey
participants can enter a drawing to win one of 5 new Google 16GB Nexus 7 tablets
with Wi-Fi! The drawing is open to legal U.S. residents, age 18 or older, until
Dec. 17, 2012. Take our annual IT Salary Survey today!
http://cwonline.computerworld.com/t/8354331/823929840/589225/0/
BEST PLACES TO WORK -- CALL FOR NOMINATIONS
Is your IT department a great place to work? Our 20th annual Best Places to Work
in IT report will honor 100 organizations that offer great benefits, salaries
and opportunities for training and advancement, as well as interesting projects
and a flexible and diverse work environment. Nominate an organization now
through Dec. 13, 2012:
http://cwonline.computerworld.com/t/8354331/823929840/566535/0/
SHARK TANK OF THE DAY
______________________
Just like at work, except she'll never retire
This pilot fish is the de facto support guy for his mom -- and he used to do
that support over the phone, which was extremely painful. But it turns out even
remote-control software doesn't solve all the problems.
http://cwonline.computerworld.com/t/8354331/823929840/592775/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Asked if they'd rather receive a PC or a tablet as a holiday gift, 59% of
respondents in a PriceGrabber survey opted for the tablet. Are these results a
sign of things to come, or will this holiday season see a rebound in PC sales?
http://cwonline.computerworld.com/t/8354331/823929840/590468/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8354331/823929840/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8354331/823929840/311619/0/
Facebook: http://cwonline.computerworld.com/t/8354331/823929840/311620/0/
Twitter: http://cwonline.computerworld.com/t/8354331/823929840/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8354331/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODM1NDMzMQ%3d%3d&x=cba6886d
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8354331/823929840/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8354331/823929840/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8354331/823929840/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, December 5, 2012
Can an enterprise run its security with Microsoft tools?
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:09 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment