Wednesday, January 16, 2013

Java security comes down to 'war of attrition'

Computerworld Security: Issues and Trends: January 16, 2013
===============================================================

Java security comes down to 'war of attrition'

Users and Oracle both need to do their part against a malware industrial complex
that can quickly attack any security hole.
http://cwonline.computerworld.com/t/8423530/823929840/597508/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Moovweb~~~~~~~~~~~~~~~~~~~~~

Creating the Right Mobile Strategy

In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You
Need to Know Before You Get Started", get the insight you need to make an
educated decision on the move to mobile.

http://cwonline.computerworld.com/t/8423530/823929840/597509/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a1ef109a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. How to talk security so people will listen (and comply!)
http://cwonline.computerworld.com/t/8423530/823929840/597510/0/

2. Security Manager's Journal: When technologies collide
http://cwonline.computerworld.com/t/8423530/823929840/597511/0/

3. Business Roundtable backs CISPA approach to cybersecurity
http://cwonline.computerworld.com/t/8423530/823929840/597512/0/

4. Swartz suicide shines light on federal anti-hacking law
http://cwonline.computerworld.com/t/8423530/823929840/597513/0/

5. There's no magic pill for security
http://cwonline.computerworld.com/t/8423530/823929840/597514/0/

6. Cryptocat encrypted IM project goes mobile this year
http://cwonline.computerworld.com/t/8423530/823929840/597515/0/

7. INSIDER: Certification programs are making it easier to know all about a cloud vendor
http://cwonline.computerworld.com/t/8423530/823929840/597516/0/

8. Security Manager's Journal: Ready to hire, but coming up empty
http://cwonline.computerworld.com/t/8423530/823929840/597517/0/

9. Security lessons from 2012
http://cwonline.computerworld.com/t/8423530/823929840/597518/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: Workday~~~~~~~~~~~~~~~~~~~~~

CIOs in the Cloud

As cloud computing infiltrates the enterprise and transforms the business, the
CIO's role is also experiencing a transformation. This webcast focuses on how
cloud trends arechanging the CIO mindset and how cloud SaaS fosters a
cost-effective, productive, and efficient enterprise.

http://cwonline.computerworld.com/t/8423530/823929840/597519/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fe6a2cb4

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

How to talk security so people will listen (and comply!)

Sure you want users to comply with security edicts, but would you phish your own
employees or share your company's hack history? At least some CIOs say yes.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/8423530/823929840/597510/0/

Security Manager's Journal: When technologies collide

An encryption initiative runs into the law of unintended consequences, since the
legal department can't search encrypted emails for e-discovery purposes.
http://cwonline.computerworld.com/t/8423530/823929840/597511/0/

Business Roundtable backs CISPA approach to cybersecurity

A cybersecurity proposal released by the influential Business Roundtable
supports many of the provisions contained in the controversial Cyber
Intelligence Sharing and Protection Act (CISPA) that was passed by the U.S.
House of Representatives last year.
http://cwonline.computerworld.com/t/8423530/823929840/597512/0/

Swartz suicide shines light on federal anti-hacking law

The suicide of Internet activist and pioneer Aaron Swartz has focused attention
on what some activists say is the overzealous use of the federal Computer Fraud
and Abuse Act anti-hacking statute.
http://cwonline.computerworld.com/t/8423530/823929840/597513/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP and Intel® Xeon® processors~~~~~~~~~~~~~~~~~~~~~

Strategy Guide to Security Information Management

In today's world, with its mobile devices and ubiquitous Internet access,
citizens expect increasingly fast, convenient and accessible government
services. Security is needed at every level of IT: applications, servers,
storage, end-devices and networks.

http://cwonline.computerworld.com/t/8423530/823929840/597520/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5dff2537

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

There's no magic pill for security

Too often, New Year's resolutions to get into better shape are derailed because
of a lack of realistic planning. The same thing happens in the security sphere.
http://cwonline.computerworld.com/t/8423530/823929840/597514/0/

Cryptocat encrypted IM project goes mobile this year

Cryptocat, a project building an instant messaging platform that provides more
privacy and security for activists, plans a host of improvements this year,
including developing an application for mobile devices.
http://cwonline.computerworld.com/t/8423530/823929840/597515/0/

INSIDER: Certification programs are making it easier to know all about a cloud vendor

Third-party assessments can save you the time and money required to verify a
vendor's claims for infrastructure and security. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/8423530/823929840/597516/0/

Security Manager's Journal: Ready to hire, but coming up empty

Now that our manager has gotten approval to hire new staff, he can't find anyone
eager for the good jobs he's offering. Is infosec management a bubble of
prosperity?
http://cwonline.computerworld.com/t/8423530/823929840/597517/0/

Security lessons from 2012

More DDoS attacks on banks, cyberwarfare and targeted attacks could well be in
store in 2013, security experts warn.
http://cwonline.computerworld.com/t/8423530/823929840/597518/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The year 2012 saw innovation, litigation, disruption and accomplishment. Of them
all, what was the biggest tech story of 2012?

http://cwonline.computerworld.com/t/8423530/823929840/595542/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8423530/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8423530/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/8423530/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/8423530/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8423530/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODQyMzUzMA%3d%3d&x=7ae9198e

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8423530/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8423530/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8423530/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:10 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive