Computerworld Security: October 22, 2013
===============================================================
Passing PCI firewall audits: Top 5 checks for ongoing success
If you are an information security professional whose organization handles
credit card information, then unless you have been living under a rock since PCI
DSS was first introduced in 2004, PCI compliance is a fact of life. Many love to
bash the standard as the "low bar" for security, but when it comes to
"Requirement 1: Install and maintain a firewall configuration to protect
cardholder data," special attention to these five components (out of 21 outlined
in Requirement 1), will a set a high, sustainable standard (yes&really!) for
both security and PCI compliance.
http://cwonline.computerworld.com/t/8768698/823929835/637916/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mitel Networks~~~~~~~~~~~~~~~~~~~~~
Cloud-based UC: A Foundation for Business Transformation
CIOs are turning to cloud-based UC to reduce IT costs and focus resources on
projects that deliver the greatest strategic advantages.
http://cwonline.computerworld.com/t/8768698/823929835/637917/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6cb970cb
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Mexico condemns alleged NSA hacking of president's email
http://cwonline.computerworld.com/t/8768698/823929835/637918/19/
2. France summons US ambassador over NSA spy allegations
http://cwonline.computerworld.com/t/8768698/823929835/637919/20/
3. Darlene Storm: Hack in the Box: Researchers attack ship tracking systems for fun and profit
http://cwonline.computerworld.com/t/8768698/823929835/637920/21/
4. Antone Gonsalves: How governments will help criminals build mobile malware
http://cwonline.computerworld.com/t/8768698/823929835/637921/28/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~
DDoS Attackers Changed Tactics in Q3 2013
According to Prolexic's upcoming DDoS attack report, there was a significant
increase in reflection attacks (DNS and CHARGEN) in Q3. Read what else changed
and what new threats emerged.
http://cwonline.computerworld.com/t/8768698/823929835/637922/29/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mexico condemns alleged NSA hacking of president's email
The Mexican government has condemned newly reported spying activities of the
U.S. National Security Agency against the country's former president while he
was in office.
http://cwonline.computerworld.com/t/8768698/823929835/637918/30/
France summons US ambassador over NSA spy allegations
French foreign minister Laurent Fabius has summoned the U.S. ambassador to
explain allegations that the U.S. National Security Agency spied on French
telecommunications giant Alcatel-Lucent and gathered data on millions of phone
calls.
http://cwonline.computerworld.com/t/8768698/823929835/637919/31/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5
key principles successful CIOs are using to redesign IT infrastructure of any
size. Learn how to be prepared to adapt your environment in a way that supports
distributed employees, anytime anywhere collaboration and the need for business
continuity during a disaster.
http://cwonline.computerworld.com/t/8768698/823929835/637923/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c1e02938
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Hack in the Box: Researchers attack ship tracking systems for fun and profit
What happens when a protocol is designed without a single thought to security?
It is full of vulnerabilities waiting to be exploited of course. At Hack in the
Box security conference, researchers demonstrated numerous attacks on Automated
Identification Systems (AIS), a mandatory global tracking system for about
400,000 ships. They warned that pirates or terrorists can easily hack it.
http://cwonline.computerworld.com/t/8768698/823929835/637920/33/
Antone Gonsalves: How governments will help criminals build mobile malware
Government-sponsored hackers in cyberespionalge campaigns will likely build
some of the best mobile malware, which is sure to trickle down to the criminal
underground.
http://cwonline.computerworld.com/t/8768698/823929835/637921/34/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
COMPUTERWORLD'S 2014 SALARY SURVEY
How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.
Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8768698/823929835/637847/35/
DIGITAL SPOTLIGHT: SECURITY
In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8768698/823929835/631622/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=14681e38
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8768698/823929835/604375/37/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8768698/823929835/598565/38/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still
managed some surprises. What do you think the most important news from Apple's
iPhone unveiling was?
http://cwonline.computerworld.com/t/8768698/823929835/630384/39/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8768698/823929835/156832/40/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8768698/823929835/311619/41/
Facebook: http://cwonline.computerworld.com/t/8768698/823929835/311620/42/
Twitter: http://cwonline.computerworld.com/t/8768698/823929835/311621/43/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8768698/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzY4Njk4&x=7b6b3507
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8768698/823929835/72510/45/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8768698/823929835/231613/46/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8768698/823929835/72509/47/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, October 22, 2013
Passing PCI firewall audits: Top 5 checks for ongoing success
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:13 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment