Tuesday, November 19, 2013

November Patch Tuesday: Light on critical updates

Computerworld Security: November 19, 2013
===============================================================

November Patch Tuesday: Light on critical updates

Only three Critical updates are included in Microsoft's November Patch
Tuesday release. With the remaining five updates rated as Important, November is
an average Patch Tuesday for Microsoft, covering 19 vulnerabilities in patches
for Office and Internet Explorer.
http://cwonline.computerworld.com/t/8794283/823929835/643011/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CDW~~~~~~~~~~~~~~~~~~~~~

Defense in Depth Matures

Over the last few years, security risks have grown exponentially. Hackers,
attackers and a motley crew of cyber thieves have enlisted far more
sophisticated attack methods to put computers and entire networks at risk.
Security threats are growing and evolving.

http://cwonline.computerworld.com/t/8794283/823929835/643012/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=907dd2fa

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Hackers use zero-day vulnerability to breach vBulletin support forum
http://cwonline.computerworld.com/t/8794283/823929835/643013/19/

2. Google to pay $17M to states in Apple cookies case
http://cwonline.computerworld.com/t/8794283/823929835/643014/20/

3. Security Manager's Journal: Time to tweak the security policies
http://cwonline.computerworld.com/t/8794283/823929835/643015/21/

4. Thornton May: Caught between mobility's rock and hard place
http://cwonline.computerworld.com/t/8794283/823929835/643016/28/

5. Adoption, privacy biggest topics as NIST cybersecurity framework nears February deadline
http://cwonline.computerworld.com/t/8794283/823929835/643017/29/

6. Darlene Storm: Secret TPP agreement, SOPA on steroids, may be the end of the Internet as we know it
http://cwonline.computerworld.com/t/8794283/823929835/643018/30/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix~~~~~~~~~~~~~~~~~~~~~

Delivering Enterprise Info Securely on tablets & smartphones

Android and iOS-based consumer devices including smartphones and tablets play an
increasing role in enterprise computing, providing new flexibility and mobility
for workers and IT—but creating new challenges around security. This paper
describes these issues and explains how they can be addressed effectively with
Citrix BYOD solutions.

http://cwonline.computerworld.com/t/8794283/823929835/643019/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=89629237

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hackers use zero-day vulnerability to breach vBulletin support forum

A group of hackers claim to have exploited an undocumented vulnerability in the
vBulletin Internet forum software in order to break into the MacRumors.com and
vBulletin.com forums.
http://cwonline.computerworld.com/t/8794283/823929835/643013/32/

Google to pay $17M to states in Apple cookies case

Google has reached a $17 million settlement with 37 states and the District of
Columbia over its unauthorized placement of cookies on devices running Apple's
Safari browser, New York Attorney General Eric Schneiderman said.
http://cwonline.computerworld.com/t/8794283/823929835/643014/33/

Security Manager's Journal: Time to tweak the security policies

No policy, no matter how well crafted, is immune from periodic review. Fall is
when our manager tackles that.
http://cwonline.computerworld.com/t/8794283/823929835/643015/34/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Verizon Wireless~~~~~~~~~~~~~~~~~~~~~

Managing the Complexity of Connected Machines

M2M, or machine to machine, technology is revolutionizing business today. But IT
professionals who have deployed or are piloting M2M solutions report a variety
of integration challenges.

http://cwonline.computerworld.com/t/8794283/823929835/643020/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=161046e5

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Thornton May: Caught between mobility's rock and hard place

The rock: Users want to use their smartphones for work. The hard place: Security
is deficient. All CIOs are caught between the two.
http://cwonline.computerworld.com/t/8794283/823929835/643016/36/

Adoption, privacy biggest topics as NIST cybersecurity framework nears February deadline

The National Institute of Standards and Technology (NIST) held a fifth workshop
in Raleigh, North Carolina last week on the comprehensive, preliminary
cybersecurity framework mandated under President Obama's February 2012 executive
order, the last such gathering before the framework becomes final in February.
http://cwonline.computerworld.com/t/8794283/823929835/643017/37/

Darlene Storm: Secret TPP agreement, SOPA on steroids, may be the end of the Internet as we know it


Dirty deals done in secret behind closed doors could signal the end of the
Internet as we know it. If you hated SOPA, PIPA or ACTA, then you will despise
the stronger Trans-Pacific Partnership version. Analysis of the leaked TPP
Intellectual Property Rights chapter suggests it is a nightmare for netizens
fond of Internet freedom, but it is a dream come true for Hollywood, copyright
trolls and big Pharma.
http://cwonline.computerworld.com/t/8794283/823929835/643018/38/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8794283/823929835/641183/39/


COMPUTERWORLD'S 2014 SALARY SURVEY

How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.

Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8794283/823929835/637847/40/


DIGITAL SPOTLIGHT: SECURITY

In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]

To read the report, click here:
http://cwonline.computerworld.com/t/8794283/823929835/631622/41/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=af06a711

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8794283/823929835/604375/42/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8794283/823929835/598565/43/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey shows that 90% of drivers would consider using an autonomous car
if it would cut their insurance rates. Are you one of them?

http://cwonline.computerworld.com/t/8794283/823929835/640997/44/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8794283/823929835/156832/45/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8794283/823929835/311619/46/

Facebook: http://cwonline.computerworld.com/t/8794283/823929835/311620/47/

Twitter: http://cwonline.computerworld.com/t/8794283/823929835/311621/48/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8794283/823929835/131135/49/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04Nzk0Mjgz&x=f861652d

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8794283/823929835/72510/50/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8794283/823929835/231613/51/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8794283/823929835/72509/52/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:32 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive