Friday, February 28, 2014

Cloud security concerns are overblown, experts say

Computerworld Security: February 28, 2014
===============================================================

Cloud security concerns are overblown, experts say

Security concerns should not deter enterprises from using public cloud
technologies when it makes business sense.
http://cwonline.computerworld.com/t/8866774/823929835/659136/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Premier 100 IT Leadership Conference~~~~~~~~~~~~~~~~~~~~~

Gain huge insights and enjoy huge savings.

Imagine downloading unique insights from the world's top IT leaders in just two
days. Explore a breakthrough a new leadership model that transforms the way
C-suite teams innovate, transform and collaborate. Brainstorm innovative IT
strategies that deliver real value for your enterprise. Network with Premier 100
IT Award winners and your peers.

http://cwonline.computerworld.com/t/8866774/823929835/652989/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Michael Horowitz: Chromebooks defend against the Flash Player
http://cwonline.computerworld.com/t/8866774/823929835/659137/19/

2. Amazon.com security slip allowed unlimited password guesses on mobile apps
http://cwonline.computerworld.com/t/8866774/823929835/659138/20/

3. US government seeks to hold phone data beyond five-year limit
http://cwonline.computerworld.com/t/8866774/823929835/659139/21/

4. Security researchers urge tech companies to explain their cryptographic choices
http://cwonline.computerworld.com/t/8866774/823929835/659140/28/

5. JR Raphael: How Google's Android security is about to get even smarter
http://cwonline.computerworld.com/t/8866774/823929835/659141/29/

6. Richi Jennings: EMC, RSA, NSA, @TrustyCon, and ''dirty tricks''
http://cwonline.computerworld.com/t/8866774/823929835/659142/30/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM Corporation~~~~~~~~~~~~~~~~~~~~~

Extreme Warehouse Speed for Fast Business Decisions

Informix ebook highlighting benefits of making decisions 'at the speed of
business'; and discusses optimizing warehouse performance; and simplifying
resources

http://cwonline.computerworld.com/t/8866774/823929835/659143/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0409d1f4

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Michael Horowitz: Chromebooks defend against the Flash Player


Recently Adobe released, yet another, emergency fix to their Flash player. It
has been obvious for a long time that we can't trust Flash. Yet, despite a
history of bugs that rivals Java, Flash remains popular. If you regularly need
to use Flash enabled websites, the safest platform for doing so is a Chromebook.
http://cwonline.computerworld.com/t/8866774/823929835/659137/32/

Amazon.com security slip allowed unlimited password guesses on mobile apps

A gaping hole in Amazon.com's mobile application, now fixed, allowed hackers to
have an unlimited number of attempts guessing a person's password, according to
security vendor FireEye.
http://cwonline.computerworld.com/t/8866774/823929835/659138/33/

US government seeks to hold phone data beyond five-year limit

The U.S. government has asked a secret surveillance court to allow it to hold
telephone metadata for a period beyond the current five-year limit, for use as
potential evidence in civil lawsuits regarding the collection of the data.
http://cwonline.computerworld.com/t/8866774/823929835/659139/34/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: VCE~~~~~~~~~~~~~~~~~~~~~

Rompetrol Case Study

After a successful acquisition and growth phase, Rompetrol turned its energy
into improving global operations by consolidating IT operations and launching a
series of IT initiatives including an SAP rollout and a move toward private
cloud.

http://cwonline.computerworld.com/t/8866774/823929835/659144/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=41de8c51

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security researchers urge tech companies to explain their cryptographic choices

Fourteen prominent security and cryptography experts have signed an open letter
to technology companies urging them to take steps to regain users' trust
following reports over the past year that vendors collaborated with government
agencies to undermine consumer security and facilitate mass surveillance.
http://cwonline.computerworld.com/t/8866774/823929835/659140/36/

JR Raphael: How Google's Android security is about to get even smarter


Google's made a lot of progress in protecting Android users from threats -- and
the company's about to take another step in making all Android devices even more
secure.
http://cwonline.computerworld.com/t/8866774/823929835/659141/37/

Richi Jennings: EMC, RSA, NSA, @TrustyCon, and ''dirty tricks''


@Mikko, the notoriously publicity-shy CTO, doesn't trust RSA.

The RSA (NYSE:EMC) Conference was boycotted yesterday by TrustyCon attendees. A
range of speakers criticized the company's alleged cosy links with the NSA,
arguing that the industry badly needs a huge dose of trustworthiness.

In IT Blogwatch, bloggers reach for the bottomless bucket of popcorn. Not to
mention: Hypponen explains his 'personal' reasons...
http://cwonline.computerworld.com/t/8866774/823929835/659142/38/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8866774/823929835/641183/39/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8866774/823929835/643300/40/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8866774/823929835/604375/41/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8866774/823929835/598565/42/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 40% of tech support workers had to remove malware
from devices after employees visited adult content sites. Is this a problem at
your company?

http://cwonline.computerworld.com/t/8866774/823929835/656068/43/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8866774/823929835/156832/44/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8866774/823929835/311619/45/

Facebook: http://cwonline.computerworld.com/t/8866774/823929835/311620/46/

Twitter: http://cwonline.computerworld.com/t/8866774/823929835/311621/47/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8866774/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODY2Nzc0&x=f8730d85

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8866774/823929835/72510/49/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8866774/823929835/231613/50/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8866774/823929835/72509/51/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:23 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive