Computerworld Security: Issues and Trends: June 05, 2013
===============================================================
Security Manager's Journal: Our network infrastructure has fallen far out of date
The network team is on board with a plan to update the devices to current
versions, but who will do the work?
http://cwonline.computerworld.com/t/8607171/823929840/614791/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Globanet~~~~~~~~~~~~~~~~~~~~~
Beyond Data Migration Best Practices
When managing a migration, performance optimization is at the heart of the
process. With millions (or even billions) of items to move, ensuring that you
mitigate any expected environmental or configuration bottlenecks is essential.
http://cwonline.computerworld.com/t/8607171/823929840/614792/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ac88a05e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. The BYOD mobile security threat Is real
http://cwonline.computerworld.com/t/8607171/823929840/614793/0/
2. Growing mobile malware threat swirls (mostly) around Android
http://cwonline.computerworld.com/t/8607171/823929840/614794/0/
3. Private retaliation in cyberspace a 'remarkably bad idea'
http://cwonline.computerworld.com/t/8607171/823929840/614795/0/
4. Security Manager's Journal: Acquisitions need early security review
http://cwonline.computerworld.com/t/8607171/823929840/614796/0/
5. Could the Bitcoin network be used as an ultrasecure notary service?
http://cwonline.computerworld.com/t/8607171/823929840/614797/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: Workday~~~~~~~~~~~~~~~~~~~~~
The Mobile Enterprise
Today's mobile enterprise requires important data anywhere, anytime. And with
mobile enterprise applications, IT needs to offer simple, easy-to-use apps that
employees will embrace – without compromising security.
http://cwonline.computerworld.com/t/8607171/823929840/614798/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7179e81d
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The BYOD mobile security threat Is real
Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the
doors to data breaches in a BYOD environment, says a cyber-crime expert in this
CIO.com interview.
http://cwonline.computerworld.com/t/8607171/823929840/614793/0/
Growing mobile malware threat swirls (mostly) around Android
Mobile devices are getting hit by a boom in malware similar to the one that hit
PCs starting with the rise of the Web, a security software executive said.
http://cwonline.computerworld.com/t/8607171/823929840/614794/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: HP Intel VMware~~~~~~~~~~~~~~~~~~~~~
Your IT Journey - Your Way
Faced with unrelenting pressure to do more with less, IT leaders are
implementing virtualization, mobility and cloud computing in their enterprises.
In this Knowledge Vault Exchange you'll find a plethora of valuable information,
including videos, on-demand Webcasts, white papers and Twitter chats.
http://cwonline.computerworld.com/t/8607171/823929840/614799/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ae07cf9f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Private retaliation in cyberspace a 'remarkably bad idea'
Despite the growing threat of state-sponsored cyberattacks launched from China
and other countries, U.S companies should not be allowed fight back on their
own, security experts say.
http://cwonline.computerworld.com/t/8607171/823929840/614795/0/
Security Manager's Journal: Acquisitions need early security review
It's always best when you can do a security review ahead of the due diligence
phase, but one will certainly be needed at some point.
http://cwonline.computerworld.com/t/8607171/823929840/614796/0/
Could the Bitcoin network be used as an ultrasecure notary service?
Manuel Araoz, a 23-year-old developer in Argentina, has an idea for Bitcoin that
doesn't focus on money.
http://cwonline.computerworld.com/t/8607171/823929840/614797/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8607171/823929840/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8607171/823929840/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
BYOD has moved beyond smartphones and tablets to PCs. In fact, about 25% of
employees in businesses with more than 10 employees have bought the primary PC
they use for work, meaning companies are buying fewer PCs. Do you think BYOD is
to blame for slack PC sales?
http://cwonline.computerworld.com/t/8607171/823929840/613901/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8607171/823929840/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8607171/823929840/311619/0/
Facebook: http://cwonline.computerworld.com/t/8607171/823929840/311620/0/
Twitter: http://cwonline.computerworld.com/t/8607171/823929840/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8607171/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODYwNzE3MQ%3d%3d&x=d2b0036e
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8607171/823929840/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8607171/823929840/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8607171/823929840/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, June 5, 2013
Network infrastructure that's fallen far out of date
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 9:46 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment