Wednesday, August 14, 2013

SaaS contracts too often lack security specifics

Computerworld Security: Issues and Trends: August 14, 2013
===============================================================

SaaS contracts too often lack security specifics

The large majority of people working in IT procurement are "significantly
dissatisfied" with the way SaaS (software as a service) vendors define contract
language related to security, a feeling likely to persist through 2015,
according to a Gartner report.
http://cwonline.computerworld.com/t/8694766/823929840/625176/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: SAS~~~~~~~~~~~~~~~~~~~~~

Data Visualization Techniques

Regardless of how much data an organization has, creating visuals of data will
deliver the most meaningful analysis. This paper discusses some of the basic
issues concerning data visualization, from data size and column composition, to
solving unique challenges presented by big data.

http://cwonline.computerworld.com/t/8694766/823929840/625177/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=be47fdfa

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security Manager's Journal: Learning to let go and offshore
http://cwonline.computerworld.com/t/8694766/823929840/625178/19/

2. Android one-click Google authentication method puts users, businesses at risk
http://cwonline.computerworld.com/t/8694766/823929840/625179/20/

3. Researchers demo exploits that bypass Windows 8 Secure Boot
http://cwonline.computerworld.com/t/8694766/823929840/625180/21/

4. Clouds are backing up clouds, with more choices on tap
http://cwonline.computerworld.com/t/8694766/823929840/625181/28/

5. Chrome's password security insanity can be cured
http://cwonline.computerworld.com/t/8694766/823929840/625182/29/

6. Feds explore cybersecurity incentives for the private sector
http://cwonline.computerworld.com/t/8694766/823929840/625183/30/

7. Facebook turns on secure browsing by default
http://cwonline.computerworld.com/t/8694766/823929840/625184/31/

8. Attackers turning to legit cloud services firms to plant malware
http://cwonline.computerworld.com/t/8694766/823929840/625185/32/

9. Botnet-powered distributed file storage system uses JavaScript
http://cwonline.computerworld.com/t/8694766/823929840/625186/33/

10. Researchers bypass home and office security systems
http://cwonline.computerworld.com/t/8694766/823929840/625187/34/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~

Preparing Your Infrastructure for the Hyperconvergence Era

From cloud computing and virtualization to mobility and unified communications,
an array of innovative technologies is transforming today's data centers. And
along the way, they're also flooding corporate networks with enormous new
torrents of traffic.

http://cwonline.computerworld.com/t/8694766/823929840/625188/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2f300da2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security Manager's Journal: Learning to let go and offshore

The pressures to send some IT security activities offshore couldn't be resisted,
but so far, it's working out well.
http://cwonline.computerworld.com/t/8694766/823929840/625178/36/

Android one-click Google authentication method puts users, businesses at risk

A feature that allows Android users to authenticate themselves on Google
websites without having to enter their account password can be abused by rogue
apps to give attackers access to Google accounts, a security researcher showed.
http://cwonline.computerworld.com/t/8694766/823929840/625179/37/

Researchers demo exploits that bypass Windows 8 Secure Boot

The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain
manufacturers because of oversights in how those vendors implemented the Unified
Extensible Firmware Interface (UEFI) specification, according to a team of
security researchers.
http://cwonline.computerworld.com/t/8694766/823929840/625180/38/

Clouds are backing up clouds, with more choices on tap

Enterprises that rely on cloud-based services are getting more options for
falling back on another cloud if necessary.
http://cwonline.computerworld.com/t/8694766/823929840/625181/39/

Chrome's password security insanity can be cured

Google should lock up Chrome passwords with a master key to make casual thieves
work harder.
http://cwonline.computerworld.com/t/8694766/823929840/625182/40/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~

VMware Horizon View and EMC VSPEX

Take the Easy Route to Next Generation Virtual Desktops. Learn how VSPEX with
End User Computing Transforms Central Vermont Medical Center IT from Problem
Solver to Business Enabler.

http://cwonline.computerworld.com/t/8694766/823929840/625189/41/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=157d1208

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Feds explore cybersecurity incentives for the private sector

U.S. government agencies are exploring new ways to provide incentives for
private companies to invest more money in cybersecurity, President Barack
Obama's administration has announced.
http://cwonline.computerworld.com/t/8694766/823929840/625183/42/

Facebook turns on secure browsing by default

Facebook turned on a key security feature by default that scrambles data sent by
users to the company's servers, following similar moves in recent years by Web
services such as Google and Twitter.
http://cwonline.computerworld.com/t/8694766/823929840/625184/43/

Attackers turning to legit cloud services firms to plant malware

Malware writers are ramping up their use of commercial file hosting sites and
cloud services to distribute malware programs, security researchers said at the
recent Black Hat conference.
http://cwonline.computerworld.com/t/8694766/823929840/625185/44/

Botnet-powered distributed file storage system uses JavaScript

The latest Web technologies can be used to build a secure and distributed file
storage system by loading a piece of JavaScript code into users' Web browsers
without them knowing, a researcher demonstrated at the Defcon security
conference.
http://cwonline.computerworld.com/t/8694766/823929840/625186/45/

Researchers bypass home and office security systems

Many door and window sensors, motion detectors and keypads that are part of
security systems used in millions of homes and businesses can be bypassed by
using relatively simple techniques, according to researchers from security
consultancy firm Bishop Fox.
http://cwonline.computerworld.com/t/8694766/823929840/625187/46/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8694766/823929840/615407/47/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a06c5b37

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here: http://cwonline.computerworld.com/t/8694766/823929840/616819/48/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8694766/823929840/604375/49/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8694766/823929840/598565/50/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 67% of senior IT professionals are expected to be
available during their vacations, but in reality it seems like everyone does at
least some work while away. Do IT pros every really get a summer vacation?

http://cwonline.computerworld.com/t/8694766/823929840/621572/51/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8694766/823929840/156832/52/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8694766/823929840/311619/53/

Facebook: http://cwonline.computerworld.com/t/8694766/823929840/311620/54/

Twitter: http://cwonline.computerworld.com/t/8694766/823929840/311621/55/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8694766/823929840/131135/56/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODY5NDc2Ng%3d%3d&x=84fc6fee

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8694766/823929840/72510/57/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8694766/823929840/231613/58/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8694766/823929840/72509/59/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:53 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive