Computerworld Security: May 31, 2013
===============================================================
The BYOD Mobile Security Threat Is Real
Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the
doors to data breaches in a BYOD environment, says a cyber-crime expert in this
CIO.com interview.
http://cwonline.computerworld.com/t/8601062/823929835/614181/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
Network Monitoring and Troubleshooting for Dummies
The Network Monitoring and Troubleshooting for Dummies Book introduces you to
common network performance management (NPM) issues and give you a new way of
looking at solving them. This perspective allows you to see your network from
your users' point of view, namely, the services and applications they use and
their experience with them.
http://cwonline.computerworld.com/t/8601062/823929835/614182/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f15b4fd3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Google wants software vendors to respond to vulnerabilities within 7 days
http://cwonline.computerworld.com/t/8601062/823929835/614183/0/
2. In Texas, cops will soon need a warrant to search your email
http://cwonline.computerworld.com/t/8601062/823929835/614184/0/
3. Dropbox goes down for more than an hour
http://cwonline.computerworld.com/t/8601062/823929835/614185/0/
4. Mobile phone security no-brainer: Use a device passcode
http://cwonline.computerworld.com/t/8601062/823929835/614186/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: LogMeIn~~~~~~~~~~~~~~~~~~~~~
Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer
experience is a top priority. To do that, having an on-demand remote support
solution is essential. That's why companies around the world choose LogMeIn
Rescue to provide powerful, secure support of any device, anytime, anywhere.
http://cwonline.computerworld.com/t/8601062/823929835/613611/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google wants software vendors to respond to vulnerabilities within 7 days
Google wants vendors to fix or offer mitigation advice for previously unknown
and actively exploited software vulnerabilities within seven days of their
discovery.
http://cwonline.computerworld.com/t/8601062/823929835/614183/0/
In Texas, cops will soon need a warrant to search your email
Texas is poised to become the first state in the U.S. to require law enforcement
officers to get a search warrant based on probable cause before they access any
electronic communications and customer data stored by a third-party service
provider.
http://cwonline.computerworld.com/t/8601062/823929835/614184/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~
Storage Resource Management Suite Benefits
The Storage Resource Management Suite provides comprehensive monitoring,
reporting, and analysis for heterogeneous block, file, and virtualized storage
environments. It enables you to visualize applications to storage dependencies,
analyze configurations and capacity growth, and optimize your environment to
improve return on investment.
http://cwonline.computerworld.com/t/8601062/823929835/614187/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1d98d894
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dropbox goes down for more than an hour
Dropbox users this morning experienced an outage that lasted more than an hour.
The cloud storage service has yet to explain what happened.
http://cwonline.computerworld.com/t/8601062/823929835/614185/0/
Mobile phone security no-brainer: Use a device passcode
When it comes to smartphone safety, the single most important thing a mobile
phone owner can do is lock the device with a unique, four-digit PIN.
http://cwonline.computerworld.com/t/8601062/823929835/614186/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8601062/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8601062/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
BYOD has moved beyond smartphones and tablets to PCs. In fact, about 25% of
employees in businesses with more than 10 employees have bought the primary PC
they use for work, meaning companies are buying fewer PCs. Do you think BYOD is
to blame for slack PC sales?
http://cwonline.computerworld.com/t/8601062/823929835/613901/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8601062/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8601062/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8601062/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8601062/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8601062/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjAxMDYy&x=0f822d65
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8601062/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8601062/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8601062/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, May 31, 2013
The BYOD Mobile Security Threat Is Real
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:26 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment