Wednesday, October 23, 2013

Obamacare exchange contractors had past security lapses

Computerworld Security: October 23, 2013
===============================================================

Obamacare exchange contractors had past security lapses

Two of the contractors involved in developing the Affordable Care Act healthcare
exchanges have had fairly serious data security issues, a Computerworld review
of publicly available information has found.
http://cwonline.computerworld.com/t/8769803/823929835/638154/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~

Connecting the Clouds: Best Practices for Integrating ITSM

In this Industry Insight, BMC discusses how utilizing a SaaS approach to IT
Service Management can position your IT organization to best manage the growing
number of cloud-based services along with your enterprise's internal systems.

http://cwonline.computerworld.com/t/8769803/823929835/638155/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=24f40a3f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. U,S, NIST tells businesses how to boost cybersecurity
http://cwonline.computerworld.com/t/8769803/823929835/638156/19/

2. INSIDER: Kenneth van Wyk: Lingering faults with security by default
http://cwonline.computerworld.com/t/8769803/823929835/638157/20/

3. Eric Ogren: Finding the goodness in threat reports
http://cwonline.computerworld.com/t/8769803/823929835/638158/21/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~

Backup and Recovery Changes

This IDC Whitepaper provides an overview of the forces driving change within
today's IT organizations and data centers and discusses how backup and recovery
can enable or hinder broader IT infrastructure and business transformation.

http://cwonline.computerworld.com/t/8769803/823929835/638159/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=aaafc26c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

U,S, NIST tells businesses how to boost cybersecurity

Businesses that want to improve their cybersecurity posture can take a number of
steps, including conducting a risk assessment and prioritizing ways to address
gaps in their security, a U.S. agency said in recommendations released Tuesday.
http://cwonline.computerworld.com/t/8769803/823929835/638156/29/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~

Ideal Tool Set for APM For Better Business Performance

In conducting a survey of 159 IT professionals with direct responsibility for
business-critical applications, Forrester found that all enterprises surveyed
had fundamental issues while managing the performance of these applications and
business services. Read the report to learn the key findings of this study.

http://cwonline.computerworld.com/t/8769803/823929835/638160/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fe295f15

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: Kenneth van Wyk: Lingering faults with security by default

The out-of-the-box security settings for Apple's new iPhone 5S are just the
latest example. (Insider; registration required)
http://cwonline.computerworld.com/t/8769803/823929835/638157/31/

Eric Ogren: Finding the goodness in threat reports


Are you drawing the right conclusions from your favorite security
vendor's 2013 threat report? I hope so, but I talk with a lot of security
executives that miss the opportunity to use these reports as stimulus to
re-examine their security strategies. The importance of threat reports what the
trends mean to your security practices and not-so-much the details of individual
threats.
http://cwonline.computerworld.com/t/8769803/823929835/638158/32/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

COMPUTERWORLD'S 2014 SALARY SURVEY

How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.

Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8769803/823929835/637847/33/


DIGITAL SPOTLIGHT: SECURITY

In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8769803/823929835/631622/34/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b3da29d5

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8769803/823929835/604375/35/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8769803/823929835/598565/36/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?

http://cwonline.computerworld.com/t/8769803/823929835/630384/37/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8769803/823929835/156832/38/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8769803/823929835/311619/39/

Facebook: http://cwonline.computerworld.com/t/8769803/823929835/311620/40/

Twitter: http://cwonline.computerworld.com/t/8769803/823929835/311621/41/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8769803/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzY5ODAz&x=1209da43

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8769803/823929835/72510/43/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8769803/823929835/231613/44/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8769803/823929835/72509/45/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive