Computerworld Security: January 22, 2014
===============================================================
CSO 2.0: How to take your security program to the next level
Security is all about the big picture now. Here are some pointers from George
Viegas on how the "CSO 2.0" can take a more effective approach to security in
2014 and the future
http://cwonline.computerworld.com/t/8840733/823929835/652745/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Sophos, Inc.~~~~~~~~~~~~~~~~~~~~~
Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally
manage, monitor and support mobile devices from smartphones to tablets. In this
guide, you'll learn what you need to consider to find a MDM solution that best
fits your needs.
http://cwonline.computerworld.com/t/8840733/823929835/652746/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3138e383
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Syrian Electronic Army hacks Microsoft's Office Blogs site
http://cwonline.computerworld.com/t/8840733/823929835/652747/19/
2. Greg Lambert: Microsoft Patch Tuesday for January: An easy start to the year
http://cwonline.computerworld.com/t/8840733/823929835/652748/20/
3. Coding Target-related malware a side job for man living in Russia
http://cwonline.computerworld.com/t/8840733/823929835/652749/21/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Nasuni Corp~~~~~~~~~~~~~~~~~~~~~
Key Considerations When Evaluating Cloud-integrated Storage
Read this paper to hear Mark Peters, Senior Analyst at ESG, discuss:
- An overview of the Cloud-integrated Storage (CiS) marketplace
- Critical considerations for choosing a CiS solution
- Perspectives on where the market is headed
http://cwonline.computerworld.com/t/8840733/823929835/652750/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4ed18469
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Syrian Electronic Army hacks Microsoft's Office Blogs site
After hijacking several of Microsoft's Twitter accounts and compromising its
official blog over the past two weeks, the Syrian Electronic Army hacked into
the Microsoft Office Blogs site Monday.
http://cwonline.computerworld.com/t/8840733/823929835/652747/29/
~~~~~~~~~~~~~~~~~~~WEBCAST: 8x8, Inc~~~~~~~~~~~~~~~~~~~~~
Top 8 Communications Tools for Small Businesses
Powerful technology is available to help your small business improve its
communications with customers, employees and suppliers. View this free On-Demand
Webcast produced by BizLaunch.
http://cwonline.computerworld.com/t/8840733/823929835/652751/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ffff1946
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Greg Lambert: Microsoft Patch Tuesday for January: An easy start to the year
The first patch of the year, MS14-001, deals with 3 privately reported security
vulnerabilities (all relating to memory corruption issues) affecting
Microsoft Word. This vulnerability affects both 32 and 64-bit versions of all PC
versions of Microsoft word, both RT versions of Word and the Web Services
version as well. But, not the Mac version.
http://cwonline.computerworld.com/t/8840733/823929835/652748/31/
Coding Target-related malware a side job for man living in Russia
In a surprising TV interview, a 23-year-old living in Russia said he helped code
a software program that experts believe was eventually modified to steal tens of
millions of payment card details from Target.
http://cwonline.computerworld.com/t/8840733/823929835/652749/32/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8840733/823929835/641183/33/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8840733/823929835/643300/34/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8840733/823929835/604375/35/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8840733/823929835/598565/36/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Who will be Microsoft's new CEO? What's next in wearable computing? 2014
promises to be exciting. What do you think will be the biggest tech story of the
coming year?
http://cwonline.computerworld.com/t/8840733/823929835/649864/37/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8840733/823929835/156832/38/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8840733/823929835/311619/39/
Facebook: http://cwonline.computerworld.com/t/8840733/823929835/311620/40/
Twitter: http://cwonline.computerworld.com/t/8840733/823929835/311621/41/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8840733/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODQwNzMz&x=3b62f354
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8840733/823929835/72510/43/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8840733/823929835/231613/44/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8840733/823929835/72509/45/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, January 22, 2014
CSO 2.0: How to take your security program to the next level
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:41 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment