Computerworld Security: November 15, 2013
===============================================================
INSIDER: The best data security offense is a good defense
After several missed security audits, the IT team at the Pennsylvania Department
of Public Welfare built an ambitious security risk framework so audit reports
could be prepared in a timely fashion. Insider (registration required)
http://cwonline.computerworld.com/t/8791781/823929835/642460/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Argent~~~~~~~~~~~~~~~~~~~~~
What's the biggest bottleneck in VMware?
Do more CPUs improve VMware? Using VMware NIC
Teaming? Does TCP/IP affect VMware? (You'll be
surprised) Get this essential FREE white paper
now
http://cwonline.computerworld.com/t/8791781/823929835/642461/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Google says users deserve to know more about surge in gov't data requests
http://cwonline.computerworld.com/t/8791781/823929835/642462/19/
2. CIA collects in bulk data on international money transfers, say reports
http://cwonline.computerworld.com/t/8791781/823929835/642463/20/
3. Lavabit-DOJ dispute zeroes in on encryption key ownership
http://cwonline.computerworld.com/t/8791781/823929835/642464/21/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: LogMeIn~~~~~~~~~~~~~~~~~~~~~
Five Tips for Improving Customer Experience
This paper conveys how the pressure to increase customer satisfaction metrics
with less funding will increase as companies look for new ways to differentiate
their services and reduce customer churn. Learn More.
http://cwonline.computerworld.com/t/8791781/823929835/642465/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=9effb1f5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google says users deserve to know more about surge in gov't data requests
The number of government requests for user information received by Google has
doubled since 2010, not including requests made under the U.S. Foreign
Intelligence Surveillance Act, which the company is not allowed to disclose.
http://cwonline.computerworld.com/t/8791781/823929835/642462/29/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Dell~~~~~~~~~~~~~~~~~~~~~
Hybrid Cloud Computing
This white paper explores the vision and the reality of cloud computing, and
assesses the requirements for effectively managing today's hybrid cloud
environments.
http://cwonline.computerworld.com/t/8791781/823929835/642466/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=66f02ca4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CIA collects in bulk data on international money transfers, say reports
The Central Intelligence Agency secretly collects data in bulk on international
money transfers, under a program similar to the government's collection of phone
records, according to reports.
http://cwonline.computerworld.com/t/8791781/823929835/642463/31/
Lavabit-DOJ dispute zeroes in on encryption key ownership
The government's insistence, in its dispute with Lavabit, that cloud service
providers hand over their encryption keys when asked, has refocused attention on
the issue of key ownership and management in the cloud.
http://cwonline.computerworld.com/t/8791781/823929835/642464/32/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8791781/823929835/641183/33/
COMPUTERWORLD'S 2014 SALARY SURVEY
How will your salary compare with your IT peers? Computerworld's 28th Annual
Salary Survey will feature the latest IT salary trends and advice on where to
find the best-paying jobs. This year's survey participants can enter a drawing
to win 1 of 3 American Express gift cards for $500 each! The drawing is open to
legal U.S. residents, age 18 or older.
Take our annual Salary Survey today!
http://cwonline.computerworld.com/t/8791781/823929835/637847/34/
DIGITAL SPOTLIGHT: SECURITY
In our in-depth report on security, we take a closer look at mobile security and
the tricky balancing act that comes when you want to give employees greater
access to data but also need to keep corporate information safe. Also, we look
at how companies are using new technologies to lock down their supply chains,
and how one state agency dealt with thousands of security mandates by building a
risk framework from the ground up.
This free, 28-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8791781/823929835/631622/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fe2e4451
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8791781/823929835/604375/36/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8791781/823929835/598565/37/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey shows that 90% of drivers would consider using an autonomous car
if it would cut their insurance rates. Are you one of them?
http://cwonline.computerworld.com/t/8791781/823929835/640997/38/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8791781/823929835/156832/39/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8791781/823929835/311619/40/
Facebook: http://cwonline.computerworld.com/t/8791781/823929835/311620/41/
Twitter: http://cwonline.computerworld.com/t/8791781/823929835/311621/42/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8791781/823929835/131135/43/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzkxNzgx&x=7bb74f80
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8791781/823929835/72510/44/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8791781/823929835/231613/45/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8791781/823929835/72509/46/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, November 15, 2013
The best data security offense is a good defense
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:10 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment