Computerworld Security: August 20, 2013
===============================================================
McAfee exec tapped for top Homeland Security post
A McAfee vice president and seasoned technology executive will head the
Department of Homeland Security's cybersecurity office, the agency announced
Monday.
http://cwonline.computerworld.com/t/8701179/823929835/625996/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Plantronics, Inc.~~~~~~~~~~~~~~~~~~~~~
eBook: Why Voice is Critical for your UC Deployment
The ability for your team members to have all points of communication brought
together in one platform is compelling. And allowing team members to collaborate
from virtually anywhere should be appealing.
http://cwonline.computerworld.com/t/8701179/823929835/625997/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3134da2e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Attackers use Ramnit malware to target Steam users
http://cwonline.computerworld.com/t/8701179/823929835/625998/19/
2. Darlene Storm: Tweaked Zeus: Fake Instagram 'likes' are worth more $ than stolen credit card numbers
http://cwonline.computerworld.com/t/8701179/823929835/625999/20/
3. Steve Pate: HIPAA compliance in the cloud
http://cwonline.computerworld.com/t/8701179/823929835/626000/21/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast North America Inc.~~~~~~~~~~~~~~~~~~~~~
Simplifying the Transition to Exchange 2010
Summers Labs relied on a bare-bones AS/AV product, until a plan for a complete
infrastructure refresh opened the door to a more comprehensive solution. Read
this case study to learn how a cloud-based email management solution greatly
simplified the company's transition to Exchange 2010.
http://cwonline.computerworld.com/t/8701179/823929835/626001/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=401b6f5b
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attackers use Ramnit malware to target Steam users
A new variant of the Ramnit financial malware is using local Web browser
injections in order to steal log-in credentials for Steam accounts, according to
researchers from security firm Trusteer.
http://cwonline.computerworld.com/t/8701179/823929835/625998/29/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Crittercism~~~~~~~~~~~~~~~~~~~~~
New Problems Require Innovative Solutions
Crittercism surveyed over 250 technology professionals responsible for mobile
apps from North American companies, across multiple industries, to understand
their sentiments on Mobile Application Performance Management (APM) solutions.
http://cwonline.computerworld.com/t/8701179/823929835/626002/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e281b54b
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Tweaked Zeus: Fake Instagram 'likes' are worth more $ than stolen credit card numbers
Popularity on social networking sites has become so important that cyber
fraudsters have tweaked a version of the Zeus trojan to sell fake
"followers" and "likes" for the photo-sharing app
Instagram. It makes them more money than selling stolen credit card
numbers.
http://cwonline.computerworld.com/t/8701179/823929835/625999/31/
Steve Pate: HIPAA compliance in the cloud
Remember how when you were a kid, and you went to spend the night at a
friend's house, you were faced with all kinds of new and different
'rules of the house'?
The new HIPAA Omnibus rule, went into effect on March 26th, 2013, is kind
of like staying at a friend's house – though the rules are way more
complicated, and the penalty for non-compliance can be significantly more
costly. If you are a provider – or user – of public cloud services,
there are a number of key changes you need to know.
http://cwonline.computerworld.com/t/8701179/823929835/626000/32/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8701179/823929835/615407/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=155dc95f
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8701179/823929835/616819/34/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8701179/823929835/604375/35/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8701179/823929835/598565/36/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 67% of senior IT professionals are expected to be
available during their vacations, but in reality it seems like everyone does at
least some work while away. Do IT pros every really get a summer vacation?
http://cwonline.computerworld.com/t/8701179/823929835/621572/37/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8701179/823929835/156832/38/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8701179/823929835/311619/39/
Facebook: http://cwonline.computerworld.com/t/8701179/823929835/311620/40/
Twitter: http://cwonline.computerworld.com/t/8701179/823929835/311621/41/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8701179/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzAxMTc5&x=40e0680c
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8701179/823929835/72510/43/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8701179/823929835/231613/44/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8701179/823929835/72509/45/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, August 20, 2013
McAfee exec tapped for top Homeland Security post
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:31 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment