Computerworld Security: Issues and Trends: August 28, 2013
===============================================================
VMware, Citrix and Microsoft virtual desktops get encryption security
AFORE Solutions announced encryption software aimed at securing data in
virtualized environments where Microsoft Windows applications are used,
including virtualized desktop infrastructure deployments based on VMware, Citrix
or Microsoft VDI.
http://cwonline.computerworld.com/t/8710624/823929840/627858/17/
~~~~~~~~~~~~~~~~~~~WEBCAST: HP Intel VMware~~~~~~~~~~~~~~~~~~~~~
Trust your virtualization with the leaders
Faced with unrelenting pressure to do more with less, IT leaders are
implementing virtualization, mobility and cloud computing in their enterprises.
In this Knowledge Vault Exchange you'll find a plethora of valuable information,
including videos, on-demand Webcasts, white papers and Twitter chats.
http://cwonline.computerworld.com/t/8710624/823929840/627859/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a361600a
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Google to encrypt Cloud Storage data by default
http://cwonline.computerworld.com/t/8710624/823929840/627860/19/
2. Hackers may cash in when XP is retired
http://cwonline.computerworld.com/t/8710624/823929840/627861/20/
3. Microsoft will craft XP patches after April '14, but not for you
http://cwonline.computerworld.com/t/8710624/823929840/627862/21/
4. Kenneth van Wyk: Why mobile apps beat Web apps for privacy
http://cwonline.computerworld.com/t/8710624/823929840/627863/28/
5. Data security lagging at midmarket industrial firms
http://cwonline.computerworld.com/t/8710624/823929840/627864/29/
6. Security Manager's Journal: When data classifications meet the real world
http://cwonline.computerworld.com/t/8710624/823929840/627865/30/
7. Intel uses BI to quickly contain and remediate security threats
http://cwonline.computerworld.com/t/8710624/823929840/627866/31/
8. Mozilla may follow Google's lead and reject long-lived digital certificates
http://cwonline.computerworld.com/t/8710624/823929840/627867/32/
9. Mozilla 'Plug-n-Hack' project aims for tighter security tool integration
http://cwonline.computerworld.com/t/8710624/823929840/627868/33/
10. IBM is buying endpoint security company Trusteer
http://cwonline.computerworld.com/t/8710624/823929840/627869/34/
11. Cyberattacks a top cause of EU wired Internet outages
http://cwonline.computerworld.com/t/8710624/823929840/627870/35/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Akamai Technologies, Inc.~~~~~~~~~~~~~~~~~~~~~
Develop an Effective DDoS Mitigation Strategy
To lower your organization's exposure to increasing web-based attacks, you need
an effective DDoS Mitigation strategy. Download this Forrester Research report
to learn how a two-phased approach to protecting your websites and applications
can lower your risk.
http://cwonline.computerworld.com/t/8710624/823929840/627871/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=68ff9995
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google to encrypt Cloud Storage data by default
Google said it will by default encrypt data warehoused in its Cloud Storage
service.
http://cwonline.computerworld.com/t/8710624/823929840/627860/37/
Hackers may cash in when XP is retired
Hackers may bank their Windows XP zero-day exploits and cash them in after
Microsoft stops patching the aged operating system next April.
http://cwonline.computerworld.com/t/8710624/823929840/627861/38/
Microsoft will craft XP patches after April '14, but not for you
Just because Microsoft doesn't plan on giving Windows XP patches to the public
after April 8, 2014, doesn't mean it's going to stop making those patches.
http://cwonline.computerworld.com/t/8710624/823929840/627862/39/
Kenneth van Wyk: Why mobile apps beat Web apps for privacy
Internet communications are prey to surveillance, but you can better shield
them.
http://cwonline.computerworld.com/t/8710624/823929840/627863/40/
Data security lagging at midmarket industrial firms
Executives at midsized industrial firms believe their data is at little or no
risk, even though they hold valuable intellectual property and business process
data sought by criminals, according to consulting firm McGladrey.
http://cwonline.computerworld.com/t/8710624/823929840/627864/41/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
Preparing Your Infrastructure for the Hyperconvergence Era
From cloud computing and virtualization to mobility and unified communications,
an array of innovative technologies is transforming today's data centers. And
along the way, they're also flooding corporate networks with enormous new
torrents of traffic.
http://cwonline.computerworld.com/t/8710624/823929840/627872/42/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fad03215
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security Manager's Journal: When data classifications meet the real world
After finding that his company's policy on restricting data was sometimes too
rigid, our manager comes up with a new category.
http://cwonline.computerworld.com/t/8710624/823929840/627865/43/
Intel uses BI to quickly contain and remediate security threats
Intel's Security Business Intelligence platform collects and parses event and
contextual data at a rate of more than 1 million events per second, and is
capable of drilling down into selected anomalies to help users identify the
cause of potentially abnormal behavior.
http://cwonline.computerworld.com/t/8710624/823929840/627866/44/
Mozilla may follow Google's lead and reject long-lived digital certificates
Mozilla is considering the possibility of rejecting as invalid SSL certificates
issued after July 1, 2012, with a validity period of more than 60 months. Google
already made the decision to block such certificates in Chrome starting early
next year.
http://cwonline.computerworld.com/t/8710624/823929840/627867/45/
Mozilla 'Plug-n-Hack' project aims for tighter security tool integration
Mozilla is developing a protocol that aims to let security tools and Web
browsers work better together.
http://cwonline.computerworld.com/t/8710624/823929840/627868/46/
IBM is buying endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to
set up a cybersecurity software lab in Israel.
http://cwonline.computerworld.com/t/8710624/823929840/627869/47/
Cyberattacks a top cause of EU wired Internet outages
Although cyberattacks caused just 6% of significant outages of public electronic
communications networks and services in the E.U. last year, they affected more
people than hardware failure, a much more common factor in service disruptions,
according to a report from the European Union Agency for Network and Information
Security.
http://cwonline.computerworld.com/t/8710624/823929840/627870/48/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8710624/823929840/615407/49/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=af432543
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8710624/823929840/616819/50/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8710624/823929840/604375/51/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8710624/823929840/598565/52/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 67% of senior IT professionals are expected to be
available during their vacations, but in reality it seems like everyone does at
least some work while away. Do IT pros every really get a summer vacation?
http://cwonline.computerworld.com/t/8710624/823929840/621572/53/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8710624/823929840/156832/54/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8710624/823929840/311619/55/
Facebook: http://cwonline.computerworld.com/t/8710624/823929840/311620/56/
Twitter: http://cwonline.computerworld.com/t/8710624/823929840/311621/57/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8710624/823929840/131135/58/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89ODcxMDYyNA%3d%3d&x=1a56c23b
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8710624/823929840/72510/59/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8710624/823929840/231613/60/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8710624/823929840/72509/61/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, August 28, 2013
Virtual desktops get encryption security
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 8:08 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment