Computerworld Security: Issues and Trends: June 19, 2013
===============================================================
Spy-proof enterprise encryption is possible, but daunting
Data encryption could help enterprises protect their sensitive information. But
the correct implementation and use of data encryption technologies is not an
easy task, according to security experts.
http://cwonline.computerworld.com/t/8622981/823929840/616575/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: Workday~~~~~~~~~~~~~~~~~~~~~
Tip to Secure Enterprise Mobility
Today's mobile enterprise requires important data anywhere, anytime. And with
mobile enterprise applications, IT needs to offer simple, easy-to-use apps that
employees will embrace – without compromising security.
http://cwonline.computerworld.com/t/8622981/823929840/616576/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5ac68dc7
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Cisco impresses with first crack at next-gen firewall
http://cwonline.computerworld.com/t/8622981/823929840/616577/0/
2. INSIDER: Hot cloud products IT pros swear by
http://cwonline.computerworld.com/t/8622981/823929840/616578/0/
3. More malware is traveling on P2P networks these days
http://cwonline.computerworld.com/t/8622981/823929840/616579/0/
4. U.S. prosecutors propose kill switch to prevent smartphone theft
http://cwonline.computerworld.com/t/8622981/823929840/616580/0/
5. Facebook, Twitter support Google's call for transparency in surveillance requests
http://cwonline.computerworld.com/t/8622981/823929840/616581/0/
6. Prism doesn't have CIOs in a panic -- yet
http://cwonline.computerworld.com/t/8622981/823929840/616582/0/
7. New York wants its old mechanical-lever voting machines back
http://cwonline.computerworld.com/t/8622981/823929840/616583/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP~~~~~~~~~~~~~~~~~~~~~
Mobile Application Monitoring Breeds Business Possibilities
Mobile applications are radically altering the way businesses operate and how
they interact with their employees and customers. Ensuring performance of these
mobile apps is critical, yet performance is difficult to monitor.
http://cwonline.computerworld.com/t/8622981/823929840/616584/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f08b5416
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cisco impresses with first crack at next-gen firewall
When we tested next-generation firewalls last May, at least one important
security vendor wasn't there: Cisco, because it wasn't ready to be tested. Now
that the ASA CX next-generation firewall has had a year to mature, we put the
product through its paces.
http://cwonline.computerworld.com/t/8622981/823929840/616577/0/
INSIDER: Hot cloud products IT pros swear by
Spending on cloud services is so far just a fraction of total IT spending --
roughly 3% -- but the market is growing. IT pros explain what they like about
their favorite cloud-based security, storage and management services.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/8622981/823929840/616578/0/
More malware is traveling on P2P networks these days
Hackers have found a devious new way to disseminate malware: They're using
peer-to-peer networks.
http://cwonline.computerworld.com/t/8622981/823929840/616579/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast North America Inc.~~~~~~~~~~~~~~~~~~~~~
Simplifying the Transition to Exchange 2010
Summers Labs relied on a bare-bones AS/AV product, until a plan for a complete
infrastructure refresh opened the door to a more comprehensive solution. Read
this case study to learn how a cloud-based email management solution greatly
simplified the company's transition to Exchange 2010.
http://cwonline.computerworld.com/t/8622981/823929840/616585/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ad683626
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
U.S. prosecutors propose kill switch to prevent smartphone theft
U.S. prosecutors are proposing that smartphone makers offer a "kill switch" in
all new phones produced by the start of next year as part of an initiative to
cut down on theft, which sometimes turns violent.
http://cwonline.computerworld.com/t/8622981/823929840/616580/0/
Facebook, Twitter support Google's call for transparency in surveillance requests
Facebook, Twitter and Microsoft have joined Google in asking for greater
transparency in surveillance requests, following widespread criticism of the
U.S. government's surveillance programs and the role of Internet companies.
http://cwonline.computerworld.com/t/8622981/823929840/616581/0/
Prism doesn't have CIOs in a panic -- yet
Revelations over the U.S. National Security Agency's Prism surveillance program
have much of the general public in uproar, but in terms of the controversy's
impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
http://cwonline.computerworld.com/t/8622981/823929840/616582/0/
New York wants its old mechanical-lever voting machines back
The New York City Board of Elections is hoping to replace state-of-the art
optical scanning voting machines with decades-old mechanical-lever machines for
the city's mayoral primary in September.
http://cwonline.computerworld.com/t/8622981/823929840/616583/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8622981/823929840/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2df54f45
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8622981/823929840/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8622981/823929840/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Although the National Security Agency's secretly collecting phone records of
millions of Verizon customers may be nothing new, the current scope of the data
collection is "breathtaking." Do you think the U.S. government be allowed to
collect phone records and mine Internet data on citizens?
http://cwonline.computerworld.com/t/8622981/823929840/615164/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8622981/823929840/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8622981/823929840/311619/0/
Facebook: http://cwonline.computerworld.com/t/8622981/823929840/311620/0/
Twitter: http://cwonline.computerworld.com/t/8622981/823929840/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8622981/823929840/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODYyMjk4MQ%3d%3d&x=0452f908
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8622981/823929840/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8622981/823929840/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8622981/823929840/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, June 19, 2013
Spy-proof enterprise encryption is possible, but daunting
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 7:39 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment