Thursday, January 2, 2014

2014: Time to rethink privacy

Computerworld Security: January 02, 2014
===============================================================

2014: Time to rethink privacy

Companies have to fully confront the privacy issues they face and rethink their
policies from the bottom up.
http://cwonline.computerworld.com/t/8827425/823929835/649711/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CDW~~~~~~~~~~~~~~~~~~~~~

A framework for making business decisions about cloud

This paper discusses how cloud computing provides organizations with new ways to
deploy and maintain enterprise applications -- allowing for greater flexibility
and reduced complexity.

http://cwonline.computerworld.com/t/8827425/823929835/649712/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=09a18a4a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Cloud computing 2014: Moving to a zero-trust security model
http://cwonline.computerworld.com/t/8827425/823929835/649713/19/

2. The security industry finds a dream enemy -- government spy agencies
http://cwonline.computerworld.com/t/8827425/823929835/649714/20/

3. The NSA developed software for backdoor access to iPhones
http://cwonline.computerworld.com/t/8827425/823929835/649715/21/

4. Unencrypted Windows crash reports give 'significant advantage' to hackers, spies
http://cwonline.computerworld.com/t/8827425/823929835/649716/28/

5. Hackers expose phone information of 4.6M Snapchat users
http://cwonline.computerworld.com/t/8827425/823929835/649717/29/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Dell and Microsoft~~~~~~~~~~~~~~~~~~~~~

Accelerating the Benefits of Microsoft Windows Server 2012

The design and direction of the new Microsoft Windows Server 2012 enables you to
take advantage of virtualization and cloud-based technologies and
infrastructure, while providing improved capabilities for stand-alone servers.

http://cwonline.computerworld.com/t/8827425/823929835/649718/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=11fc031a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cloud computing 2014: Moving to a zero-trust security model

Instead of scaring businesses away from using hosted services, as some experts
predicted, the leaking of classified documents detailing NSA data collection
activities are driving some long overdue changes in enterprise and service
provider security and privacy concerns.
http://cwonline.computerworld.com/t/8827425/823929835/649713/31/

The security industry finds a dream enemy -- government spy agencies

2013 was the year we learned we must encrypt our data if we don't want the likes
of the U.S. National Security Agency or the U.K. Government Communications
Headquarters reading it as it crosses the Internet.
http://cwonline.computerworld.com/t/8827425/823929835/649714/32/

~~~~~~~~~~~~~~~~~~~WEBCAST: IBM~~~~~~~~~~~~~~~~~~~~~

Fighting Fraud Videos: IBM Intelligent Investigation Manager

Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM
optimizes the investigation of fraud for customers across many industries in
both the commercial and public sector space.

http://cwonline.computerworld.com/t/8827425/823929835/649719/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8a3abc9c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The NSA developed software for backdoor access to iPhones

The U.S. National Security Agency was developing in 2008 a software implant for
Apple iPhones that allowed the agency to take almost total control of the
device, including retrieving text messages and voicemail and remotely turning on
its microphone and camera, according to a report by Der Spiegel.
http://cwonline.computerworld.com/t/8827425/823929835/649715/34/

Unencrypted Windows crash reports give 'significant advantage' to hackers, spies

Windows' error- and crash-reporting system sends a wealth of data unencrypted
and in the clear, information that eavesdropping hackers or state security
agencies can use to refine and pinpoint their attacks, a researcher said today.
http://cwonline.computerworld.com/t/8827425/823929835/649716/35/

Hackers expose phone information of 4.6M Snapchat users

Phone numbers paired with user names of over 4.6 million alleged Snapchat users
were posted online by hackers, a few days after a security research group
claimed a vulnerability in the social sharing service that could allow attackers
to match phone numbers to Snapchat accounts.
http://cwonline.computerworld.com/t/8827425/823929835/649717/36/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8827425/823929835/641183/37/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8827425/823929835/643300/38/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8827425/823929835/604375/39/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8827425/823929835/598565/40/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

CEOs stepping down, social media IPOs and phablets were just a few stories made
news this year. What was the biggest tech story of 2013?

http://cwonline.computerworld.com/t/8827425/823929835/649227/41/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8827425/823929835/156832/42/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8827425/823929835/311619/43/

Facebook: http://cwonline.computerworld.com/t/8827425/823929835/311620/44/

Twitter: http://cwonline.computerworld.com/t/8827425/823929835/311621/45/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8827425/823929835/131135/46/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODI3NDI1&x=1a2cb72e

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8827425/823929835/72510/47/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8827425/823929835/231613/48/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8827425/823929835/72509/49/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:17 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive