Friday, June 14, 2013

How to avoid Big Brother's gaze

Computerworld Security: June 14, 2013
===============================================================

How to avoid Big Brother's gaze

Deciding on the level of encryption you should be using requires careful
consideration.
http://cwonline.computerworld.com/t/8617549/823929835/615993/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: KnowBe4~~~~~~~~~~~~~~~~~~~~~

How big is your 'phishing attack surface'?

Many email addresses of your organization are exposed, allowing cybercriminals
to launch spear-phishing attacks. The bigger the attack footprint, the higher
your risk. Fill out the form and we'll email you the list of exposed addresses.

http://cwonline.computerworld.com/t/8617549/823929835/613905/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Spy-proof enterprise encryption is possible, but daunting
http://cwonline.computerworld.com/t/8617549/823929835/615994/0/

2. FDA calls on medical device makers to focus on cybersecurity
http://cwonline.computerworld.com/t/8617549/823929835/615995/0/

3. US prosecutors propose kill switch to prevent smartphone theft
http://cwonline.computerworld.com/t/8617549/823929835/615996/0/

4. Sharon Machlis: Does the government even need PRISM snooping? It's got Facebook
http://cwonline.computerworld.com/t/8617549/823929835/615997/0/

5. Even before NSA scandal, US residents were anxious about privacy breaches
http://cwonline.computerworld.com/t/8617549/823929835/615998/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: VeriSign~~~~~~~~~~~~~~~~~~~~~

An Interactive eGuide: DDoS Attacks

In today's world, Distributed Denial of Service (DDoS) attacks on organizations
are becoming more prevalent. The number of attacks are increasingly annually
with no end in sight, and the damage these attacks inflict grows more severe.

http://cwonline.computerworld.com/t/8617549/823929835/615999/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=dd571260

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Spy-proof enterprise encryption is possible, but daunting

Data encryption could help enterprises protect their sensitive information
against mass surveillance by governments, as well as guard against unauthorized
access by ill-intended third parties, but the correct implementation and use of
data encryption technologies is not an easy task, according to security experts.
http://cwonline.computerworld.com/t/8617549/823929835/615994/0/

FDA calls on medical device makers to focus on cybersecurity

Medical device makers should take new steps to protect their products from
malware and cyberattacks or face the possibility that the U.S. Food and Drug
Administration won't approve their devices for use.
http://cwonline.computerworld.com/t/8617549/823929835/615995/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast North America Inc~~~~~~~~~~~~~~~~~~~~~

What it takes to deliver Security, and Privacy at Mimecast.

This whitepaper explains the process and controls that Mimecast put in place to
deliver a secure, private and trusted SaaS platform for your email security,
email archiving and email continuity.

http://cwonline.computerworld.com/t/8617549/823929835/616000/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a0049d6a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

US prosecutors propose kill switch to prevent smartphone theft

U.S. prosecutors are proposing that smartphone makers offer a "kill switch" in
all new phones produced by the start of next year as part of an initiative to
cut down on theft, which sometimes turns violent.
http://cwonline.computerworld.com/t/8617549/823929835/615996/0/

Sharon Machlis: Does the government even need PRISM snooping? It's got Facebook


What you like and who you're connected to can tell a lot more than many people
realize.


http://cwonline.computerworld.com/t/8617549/823929835/615997/0/

Even before NSA scandal, US residents were anxious about privacy breaches

Even before bombshell disclosures of the U.S. government's massive collection of
Internet and cellphone data, many U.S. residents were concerned about privacy
violations.
http://cwonline.computerworld.com/t/8617549/823929835/615998/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8617549/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d4c12c9a

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8617549/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8617549/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Although the National Security Agency's secretly collecting phone records of
millions of Verizon customers may be nothing new, the current scope of the data
collection is "breathtaking." Do you think the U.S. government be allowed to
collect phone records and mine Internet data on citizens?

http://cwonline.computerworld.com/t/8617549/823929835/615164/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8617549/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8617549/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8617549/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8617549/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8617549/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjE3NTQ5&x=9868d1e8

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8617549/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8617549/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8617549/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:11 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive