Computerworld Security: March 11, 2014
===============================================================
A clear-eyed guide to Mac OS X's actual security risks
Apple has improved its security in recent years, but is it enough?
http://cwonline.computerworld.com/t/8874987/823929835/660837/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~
Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection
solution for two decades. But, where most competitors focus exclusively on
Backup and Restore, TSM is a far more comprehensive data-protection solution.
http://cwonline.computerworld.com/t/8874987/823929835/660838/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4d32055e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
http://cwonline.computerworld.com/t/8874987/823929835/660839/19/
2. INSIDER: Virtual machine (VM) security still a work in progress
http://cwonline.computerworld.com/t/8874987/823929835/660840/20/
3. Joomla receives patches for zero-day SQL injection vulnerability, other flaws
http://cwonline.computerworld.com/t/8874987/823929835/660841/21/
4. Darlene Storm: Snowden at SXSW: We need better encryption to save us from the surveillance state
http://cwonline.computerworld.com/t/8874987/823929835/660842/28/
5. Snowden advocates at SXSW for improved data security
http://cwonline.computerworld.com/t/8874987/823929835/660843/29/
~~~~~~~~~~~~~~~~~~~WEBCAST: Druva~~~~~~~~~~~~~~~~~~~~~
Druva inSync: Endpoint Data Protection & Governance
75% of today's workforce is mobile, so you now need to think about protecting
corporate data on laptops and mobile devices. Druva inSync's integrated solution
enables you to effectively protect and govern this endpoint data.
http://cwonline.computerworld.com/t/8874987/823929835/660844/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bbb39e2c
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
Problem arose after a consultant made a configuration change, opening up control
ports to the Internet, with no authentication required.
http://cwonline.computerworld.com/t/8874987/823929835/660839/31/
INSIDER: Virtual machine (VM) security still a work in progress
Trying to protect your expanding virtual machine (VM) empire will require a
security product that can enforce policies, prevent VMs from being terminated or
infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus
solutions.
http://cwonline.computerworld.com/t/8874987/823929835/660840/32/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~
The Future of IT: Putting the Customer First
IT is adapting to this new world of consumerized technology, and focusing on its
own employees as internal customers.
http://cwonline.computerworld.com/t/8874987/823929835/660845/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=319307d2
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Joomla receives patches for zero-day SQL injection vulnerability, other flaws
Recently released security updates for the popular Joomla content management
system (CMS) address a SQL injection vulnerability that poses a high risk and
can be exploited to extract information from the databases of Joomla-based
sites.
http://cwonline.computerworld.com/t/8874987/823929835/660841/34/
Darlene Storm: Snowden at SXSW: We need better encryption to save us from the surveillance state
Speaking via video at SXSW, Ed Snowden said NSA mass surveillance is
"setting fire to the future of internet" and tech people are
"all the firefighters." Snowden and the ACLU talked about
surveillance, encryption and ways to better protect online privacy.
http://cwonline.computerworld.com/t/8874987/823929835/660842/35/
Snowden advocates at SXSW for improved data security
Encryption technologies can be a powerful tool against government surveillance,
but the most effective techniques are still largely out of reach to the average
Internet user, Edward Snowden said Monday.
http://cwonline.computerworld.com/t/8874987/823929835/660843/36/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8874987/823929835/641183/37/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8874987/823929835/643300/38/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8874987/823929835/604375/39/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8874987/823929835/598565/40/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?
http://cwonline.computerworld.com/t/8874987/823929835/659292/41/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8874987/823929835/156832/42/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8874987/823929835/311619/43/
Facebook: http://cwonline.computerworld.com/t/8874987/823929835/311620/44/
Twitter: http://cwonline.computerworld.com/t/8874987/823929835/311621/45/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8874987/823929835/131135/46/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODc0OTg3&x=a1cb50f7
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8874987/823929835/72510/47/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8874987/823929835/231613/48/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8874987/823929835/72509/49/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, March 11, 2014
A clear-eyed guide to Mac OS X's actual security risks
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:50 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment