Tuesday, February 4, 2014

PCI security standard remains solid, chief says

Computerworld Security: February 04, 2014
===============================================================

PCI security standard remains solid, chief says

The head of the organization in charge of maintaining security controls over
credit card transactions insisted Monday that its standards remain solid despite
the concerns raised by data breaches at Target and other companies.
http://cwonline.computerworld.com/t/8850329/823929835/654976/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: PC Connection | Cisco | Intel®~~~~~~~~~~~~~~~~~~~~~

Overcoming the Security Challenges of the Cloud

PC Connection, in partnership with Cisco and Intel®, recently conducted a survey
to learn how organizations are using the cloud. In this white paper, you'll
learn what you can do to mitigate security concerns and make the most out of the
cloud.

http://cwonline.computerworld.com/t/8850329/823929835/654977/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=080c330d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Google, Facebook, Microsoft show steady rise in surveillance data requests
http://cwonline.computerworld.com/t/8850329/823929835/654978/19/

2. How to use Syrian Electronic Army attacks to improve security awareness
http://cwonline.computerworld.com/t/8850329/823929835/654979/20/

3. Antone Gonsalves: Why the NSA gets higher marks for privacy than business
http://cwonline.computerworld.com/t/8850329/823929835/654980/21/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Best Practices for SPSS on Power Systems

Organizations adopting the IBM SPSS Collaboration and Deployment Services 4.2
can be affected by many variables. Read the white paper which explores the best
practices and characteristics of running the software on a POWER7 platform, and
learn how this can influence performance optimization and scalability.

http://cwonline.computerworld.com/t/8850329/823929835/654981/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=95797f64

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Google, Facebook, Microsoft show steady rise in surveillance data requests

Google, Facebook and Microsoft were among the technology companies to release
new figures showing a rising number of requests for their users' data coming
from a secretive U.S. surveillance court.
http://cwonline.computerworld.com/t/8850329/823929835/654978/29/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Anticipate, Engage and Deliver Exceptional Web Experiences

IBM Customer Experience Suite and IBM Intranet Experience Suite help
organizations delight customers through a consistently exceptional web
experience and empower employees with the social business tools they need to
drive better business results.

http://cwonline.computerworld.com/t/8850329/823929835/654982/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e2be3eba

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

How to use Syrian Electronic Army attacks to improve security awareness

Recently, we have been called in to help companies handle attacks from the
Syrian Electronic Army (SEA). Our first priority is to help contain the damage,
figure out which accounts have been compromised that have not been used yet to
cause damage, and clean things up.
http://cwonline.computerworld.com/t/8850329/823929835/654979/31/

Antone Gonsalves: Why the NSA gets higher marks for privacy than business


Despite the NSA's insatiable appetite for people's personal data, Americans
trust the spy agency more than business.
http://cwonline.computerworld.com/t/8850329/823929835/654980/32/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8850329/823929835/641183/33/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8850329/823929835/643300/34/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8850329/823929835/604375/35/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8850329/823929835/598565/36/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

There is no shortage of tablet options on the market, and consumers have their
choice of size. Which size tablet are you most likely to buy next?

http://cwonline.computerworld.com/t/8850329/823929835/652926/37/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8850329/823929835/156832/38/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8850329/823929835/311619/39/

Facebook: http://cwonline.computerworld.com/t/8850329/823929835/311620/40/

Twitter: http://cwonline.computerworld.com/t/8850329/823929835/311621/41/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8850329/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODUwMzI5&x=30daca74

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8850329/823929835/72510/43/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8850329/823929835/231613/44/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8850329/823929835/72509/45/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive