Wednesday, May 22, 2013

NAC deployment means better access control at last

Computerworld Security: Issues and Trends: May 22, 2013
===============================================================

Security Manager's Journal: NAC deployment means better access control at last

The deployment has already revealed a whole lot of devices that don't meet the
criteria for getting on the corporate network.
http://cwonline.computerworld.com/t/8590448/823929840/613142/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: VMware~~~~~~~~~~~~~~~~~~~~~

Virtualizing SAP

This KnowledgeVault has answers to questions in a series of concise videos,
webinars and assets that explain how SAP and VMware work together to deliver
optimal application performance in a virtualized environment.

http://cwonline.computerworld.com/t/8590448/823929840/613143/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=96730bcc

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. INSIDER: 7 steps to securing Java
http://cwonline.computerworld.com/t/8590448/823929840/613144/0/

2. How can we keep infosec pros a step ahead of the bad guys?
http://cwonline.computerworld.com/t/8590448/823929840/613145/0/

3. Opinion: The true root causes of software security failures
http://cwonline.computerworld.com/t/8590448/823929840/613146/0/

4. Chinese hackers master art of lying low
http://cwonline.computerworld.com/t/8590448/823929840/613147/0/

5. The U.S. military's supply chain risk called 'frightening'
http://cwonline.computerworld.com/t/8590448/823929840/613148/0/

6. Senators want sanctions against countries that support cyberattacks
http://cwonline.computerworld.com/t/8590448/823929840/613149/0/


~~~~~~~~~~~~~~~~~~~WEBCAST: Workday~~~~~~~~~~~~~~~~~~~~~

The Mobile Enterprise

Today's mobile enterprise requires important data anywhere, anytime. And with
mobile enterprise applications, IT needs to offer simple, easy-to-use apps that
employees will embrace – without compromising security.

http://cwonline.computerworld.com/t/8590448/823929840/613150/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0c0dbc0d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: 7 steps to securing Java

Java, the popular OS-independent platform and programming language, runs on just
about every kind of electronic device imaginable, including computers, cell
phones, printers, TVs, DVDs, home security systems, automated teller machines,
navigation systems, games and medical devices.
http://cwonline.computerworld.com/t/8590448/823929840/613144/0/

How can we keep infosec pros a step ahead of the bad guys?

Attacks on digital assets are on the rise, and the black hats get more inventive
every day. How should educators prepare tomorrow's information security gurus?
http://cwonline.computerworld.com/t/8590448/823929840/613145/0/

Opinion: The true root causes of software security failures

Developers being overly trusting is one of them.
http://cwonline.computerworld.com/t/8590448/823929840/613146/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: HP Intel VMware~~~~~~~~~~~~~~~~~~~~~

Your IT Journey - Your Way

Faced with unrelenting pressure to do more with less, IT leaders are
implementing virtualization, mobility and cloud computing in their enterprises.
In this Knowledge Vault Exchange you'll find a plethora of valuable information,
including videos, on-demand Webcasts, white papers and Twitter chats.

http://cwonline.computerworld.com/t/8590448/823929840/613151/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=313d215a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Chinese hackers master art of lying low

China's remarkable success in infiltrating U.S. government, military and
corporate networks in recent years shouldn't be seen as a sign that the country
is gaining on the U.S. lead in cybertechnology, security experts say. They're
just very persistent and very good at remaining undetected for long periods of
time.
http://cwonline.computerworld.com/t/8590448/823929840/613147/0/

The U.S. military's supply chain risk called 'frightening'

The U.S. military's reliance on foreign-made products, including
telecommunications equipment and semiconductors, is putting the nation's
security at risk by exposing agencies to faulty parts and to the possibility
that producing nations will stop selling vital items, according to a new report
from the Alliance for American Manufacturing.
http://cwonline.computerworld.com/t/8590448/823929840/613148/0/

Senators want sanctions against countries that support cyberattacks

Two U.S. senators will push Congress or President Barack Obama's administration
to pursue trade and immigration sanctions against China and other countries that
allegedly support cyberattacks on U.S. government agencies and businesses, the
lawmakers said.
http://cwonline.computerworld.com/t/8590448/823929840/613149/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8590448/823929840/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8590448/823929840/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

One of the first Google Glass apps, Winky, lets Glass users take pictures with
the blink of an eye, leading some to start talking about a potential privacy
issues and social etiquette. Would you buy a pair of Google Glass when it
becomes available?

http://cwonline.computerworld.com/t/8590448/823929840/611670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8590448/823929840/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8590448/823929840/311619/0/

Facebook: http://cwonline.computerworld.com/t/8590448/823929840/311620/0/

Twitter: http://cwonline.computerworld.com/t/8590448/823929840/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8590448/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODU5MDQ0OA%3d%3d&x=512e2029

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8590448/823929840/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8590448/823929840/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8590448/823929840/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:49 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive