Computerworld Security: November 04, 2013
===============================================================
Eric Ogren: Get smart about threat intelligence
Know how you are going to make the intelligence gleaned from threat feeds
actionable before you ever agree to let them into your building.
http://cwonline.computerworld.com/t/8780791/823929835/640196/17/
~~~~~~~~~~~~~~~~~~~WEBCAST: Google Enterprise~~~~~~~~~~~~~~~~~~~~~
Facing your OS's end of life? Google can help.
In April 2014, businesses around the world will stop receiving support and
updates for their operating system or mail server. If your company is among
them, there are steps you can take to minimize security risks while you
formulate a lasting solution.
http://cwonline.computerworld.com/t/8780791/823929835/640197/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d7ff0be4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. 'Canary' Chrome chirps when it smells malware
http://cwonline.computerworld.com/t/8780791/823929835/640198/19/
2. Iris ID systems go mainstream
http://cwonline.computerworld.com/t/8780791/823929835/640199/20/
3. 'Reform bill' would codify ability of NSA to spy on Americans, critics say
http://cwonline.computerworld.com/t/8780791/823929835/640200/21/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Salesforce.com~~~~~~~~~~~~~~~~~~~~~
The Future of Sales Performance Management
Learn how the future of sales performance management is integrated with CRM and
social collaboration and how this will help managers provide real-time coaching
and motivation in context to drive better sales behaviors and, ultimately,
better sales results. Download now.
http://cwonline.computerworld.com/t/8780791/823929835/640201/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c3836834
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
'Canary' Chrome chirps when it smells malware
Google has expanded malware blocking in an early development build of Chrome to
sniff out a wider range of threats than the browser already recognizes.
http://cwonline.computerworld.com/t/8780791/823929835/640198/29/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5
key principles successful CIOs are using to redesign IT infrastructure of any
size. Learn how to be prepared to adapt your environment in a way that supports
distributed employees, anytime anywhere collaboration and the need for business
continuity during a disaster.
http://cwonline.computerworld.com/t/8780791/823929835/640202/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=599cf2fb
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Iris ID systems go mainstream
Dropping prices, fast processing speeds and more user-friendly designs have
given a boost to this highly accurate biometric technology.
http://cwonline.computerworld.com/t/8780791/823929835/640199/31/
'Reform bill' would codify ability of NSA to spy on Americans, critics say
The U.S. Senate Intelligence Committee Thursday voted to back a "spying reform"
bill that critics contend codifies and extends the National Security Agency's
controversial phone metadata collection practices.
http://cwonline.computerworld.com/t/8780791/823929835/640200/32/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
COMPUTERWORLD'S 2014 SALARY SURVEY
How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.
Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8780791/823929835/637847/33/
DIGITAL SPOTLIGHT: SECURITY
In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8780791/823929835/631622/34/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=58756b5f
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8780791/823929835/604375/35/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8780791/823929835/598565/36/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
At its recent event, Apple announced it was giving away OS X Mavericks for free.
Why do you think Apple decided to do this?
http://cwonline.computerworld.com/t/8780791/823929835/638639/37/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8780791/823929835/156832/38/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8780791/823929835/311619/39/
Facebook: http://cwonline.computerworld.com/t/8780791/823929835/311620/40/
Twitter: http://cwonline.computerworld.com/t/8780791/823929835/311621/41/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8780791/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzgwNzkx&x=972c10e7
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8780791/823929835/72510/43/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8780791/823929835/231613/44/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8780791/823929835/72509/45/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Monday, November 4, 2013
Eric Ogren: Get smart about threat intelligence
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:32 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment