Computerworld Security: July 18, 2013
===============================================================
Most enterprise networks riddled with vulnerable Java installations
Despite the significant Java security improvements made by Oracle during the
past six months, Java vulnerabilities continue to represent a major security
risk for organizations because most of them have outdated versions of the
software installed on their systems, according to a report by security firm
Bit9.
http://cwonline.computerworld.com/t/8658632/823929835/620554/0/
~~~~~~~~~~~~~~~~~~~WEBCAST: Xerox~~~~~~~~~~~~~~~~~~~~~
SMB Security Guide
Amidst evolving cybersecurity threats, SMBs must be armed for the worst in order
to drive innovation in today's decentralized, mobile workforce. Join this live
webcast Tuesday, April 16, 2013, 11:00 AM EDT as we explore everything from
threats and vulnerabilities to new security models and risk management best
practices.
http://cwonline.computerworld.com/t/8658632/823929835/620555/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b843b217
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Network Solutions restores service after DDoS attack
http://cwonline.computerworld.com/t/8658632/823929835/620556/0/
2. Tech groups ask U.S. for transparency in secret data requests
http://cwonline.computerworld.com/t/8658632/823929835/620557/0/
3. Darlene Storm: Some cops are stunningly clueless about basic cybersecurity and how the Internet works
http://cwonline.computerworld.com/t/8658632/823929835/620558/0/
4. Lawmakers say NSA phone records collection violated the law
http://cwonline.computerworld.com/t/8658632/823929835/620559/0/
5. Quantum Dawn 2 will test Wall Street's cyber readiness
http://cwonline.computerworld.com/t/8658632/823929835/620560/0/
6. Security company to release testing tool for SAP mobile access
http://cwonline.computerworld.com/t/8658632/823929835/620561/0/
7. Apple, Microsoft to leap on app auto-update bandwagon
http://cwonline.computerworld.com/t/8658632/823929835/620562/0/
8. Apache Struts security update fixes critical vulnerabilities
http://cwonline.computerworld.com/t/8658632/823929835/620563/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EasyVista~~~~~~~~~~~~~~~~~~~~~
Domtar Case Study
Domtar, the largest integrated manufacturer and marketer of uncoated free sheet
paper in North America, centralized IT worldwide with EasyVista.
http://cwonline.computerworld.com/t/8658632/823929835/620564/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3aa2cc91
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Network Solutions restores service after DDoS attack
Network Solutions said Wednesday it has restored services after a distributed
denial-of-service (DDoS) attack knocked some websites it hosts offline for a few
hours.
http://cwonline.computerworld.com/t/8658632/823929835/620556/0/
Tech groups ask U.S. for transparency in secret data requests
Influential technology companies and groups want the U.S. government to lift
restrictions on publicizing secret requests for user data as the fallout
continues over the scale of government surveillance.
http://cwonline.computerworld.com/t/8658632/823929835/620557/0/
Darlene Storm: Some cops are stunningly clueless about basic cybersecurity and how the Internet works
Some cops and LEA working "intelligence," investigating cyberterrorism and
cybercrime are stunningly clueless about cybersecurity and even how the Internet
works.
http://cwonline.computerworld.com/t/8658632/823929835/620558/0/
Lawmakers say NSA phone records collection violated the law
The U.S. National Security Agency and Department of Justice exceeded their legal
authority to conduct surveillance when collecting the telephone records of
millions of U.S. residents, several U.S. lawmakers said Wednesday.
http://cwonline.computerworld.com/t/8658632/823929835/620559/0/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~
EMC Best Practices in Data Protection Monitoring
Whether you consider your domain to be a private cloud, a hybrid cloud, or a
public cloud, you are providing data protection as a service. According to ESG's
2013 IT Spending Intentions Survey, improving data backup and recovery was the
number two-most important IT priority selected by respondents (27%).
http://cwonline.computerworld.com/t/8658632/823929835/620565/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bd87bead
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Quantum Dawn 2 will test Wall Street's cyber readiness
Starting at around 8.30 a.m. ET Thursday, dozens of major Wall Street firms will
come under a series of simulated cyberattacks aimed at crippling financial
services networks around the country.
http://cwonline.computerworld.com/t/8658632/823929835/620560/0/
Security company to release testing tool for SAP mobile access
As SAP invests heavily in mobile, a security testing company will release a tool
next month to ensure mobile-accessible SAP systems are not vulnerable to
hackers.
http://cwonline.computerworld.com/t/8658632/823929835/620561/0/
Apple, Microsoft to leap on app auto-update bandwagon
By this fall, Apple and Microsoft will have followed in the footsteps of Google
to automatically update apps on their mobile and desktop platforms, another move
to take security out of users' hands.
http://cwonline.computerworld.com/t/8658632/823929835/620562/0/
Apache Struts security update fixes critical vulnerabilities
The Apache Software Foundation has released Struts 2.3.15.1, a security update
for its popular Java Web application development framework that addresses two
vulnerabilities, including a critical one that could allow remote attackers to
execute arbitrary code on the server.
http://cwonline.computerworld.com/t/8658632/823929835/620563/0/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8658632/823929835/615407/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=dff4a210
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8658632/823929835/616819/0/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8658632/823929835/604375/0/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8658632/823929835/598565/0/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Expectations were high for the Windows 8.1 preview that Microsoft rolled out at
its BUILD conference on Wednesday. Do you think with Windows 8.1 that Microsoft
has turned a corner?
http://cwonline.computerworld.com/t/8658632/823929835/617776/0/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8658632/823929835/156832/0/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8658632/823929835/311619/0/
Facebook: http://cwonline.computerworld.com/t/8658632/823929835/311620/0/
Twitter: http://cwonline.computerworld.com/t/8658632/823929835/311621/0/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8658632/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NjU4NjMy&x=a0cd38aa
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8658632/823929835/72510/0/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8658632/823929835/231613/0/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8658632/823929835/72509/0/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Thursday, July 18, 2013
Most enterprise networks riddled with vulnerable Java installations
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:49 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment