Computerworld Security: June 26, 2013
===============================================================
Critics question whether NSA data collection is effective
The recently revealed mass collection of phone records and other communications
by the U.S. National Security Agency may not be effective in preventing
terrorism, according to some critics.
http://cwonline.computerworld.com/t/8630960/823929835/617439/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
Securing Edge Data at the Center
Even as enterprises focus relentlessly on consolidation of data centers, they
continue to aggressively expand the roles and numbers of branch offices, often
located in remote locations that are difficult to support and protect. That
poses the issue of how to protect data on the edge of the network, which may be
subject to a variety of risks.
http://cwonline.computerworld.com/t/8630960/823929835/617440/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6399b05f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Robert L. Mitchell: Has Snowden affair given China carte blanche to continue industrial espionage?
http://cwonline.computerworld.com/t/8630960/823929835/617441/0/
2. Google adds malware, phishing numbers to its transparency report to make the Web 'safer'
http://cwonline.computerworld.com/t/8630960/823929835/617442/0/
3. Source code for Carberp financial malware gets leaked online
http://cwonline.computerworld.com/t/8630960/823929835/617443/0/
4. Suspected China-based hackers 'Comment Crew' rise again
http://cwonline.computerworld.com/t/8630960/823929835/617444/0/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~
DDoS Attacks Affect More than Just IT.
Learn about the far-reaching affects of a DDoS attack, how to minimize the
impact across your enterprise by developing a DDoS mitigation playbook, and how
to evaluate DDoS mitigation service providers.
http://cwonline.computerworld.com/t/8630960/823929835/617445/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Robert L. Mitchell: Has Snowden affair given China carte blanche to continue industrial espionage?
Edward Snowden's revelations about U.S. spying on China may have damaged the
U.S.'s credibility in terms of its complaints about China's allegegly
government-sponsored industrial espionage program.
http://cwonline.computerworld.com/t/8630960/823929835/617441/0/
Google adds malware, phishing numbers to its transparency report to make the Web 'safer'
Google is revealing some new numbers around malware and phishing attempts in an
effort to get more people thinking about online security and to make the Web
safer.
http://cwonline.computerworld.com/t/8630960/823929835/617442/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Siemens Enterprise Communications~~~~~~~~~~~~~~~~~~~~~
New Global Research Shows Untapped Potential
New global research, conducted by Siemens Enterprise Communications in the fall
of 2012, reveals interesting trends on virtual and remote worker habits and
productivity.
http://cwonline.computerworld.com/t/8630960/823929835/617446/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=39b46573
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Source code for Carberp financial malware gets leaked online
The source code for the Carberp financial malware has been leaked online,
increasing the risk that other cybercriminals will create their own variants
based on it, according to researchers from Russian cybercrime investigations
firm Group-IB.
http://cwonline.computerworld.com/t/8630960/823929835/617443/0/
Suspected China-based hackers 'Comment Crew' rise again
The suspected China-based hackers known as the "Comment Crew" are back at it
again, a development likely to contribute to continued tensions between the U.S.
and China over cyberattacks.
http://cwonline.computerworld.com/t/8630960/823929835/617444/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8630960/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4638d5a3
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8630960/823929835/616819/0/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8630960/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8630960/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Although the National Security Agency's secretly collecting phone records of
millions of Verizon customers may be nothing new, the current scope of the data
collection is "breathtaking." Do you think the U.S. government be allowed to
collect phone records and mine Internet data on citizens?
http://cwonline.computerworld.com/t/8630960/823929835/615164/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8630960/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8630960/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8630960/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8630960/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8630960/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjMwOTYw&x=6291edb7
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8630960/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8630960/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8630960/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, June 26, 2013
Critics question whether NSA data collection is effective
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 7:03 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment