Computerworld Security: March 20, 2014
===============================================================
Can 'data lakes' solve cloud security challenges?
Enterprise curiosity in data lakes stems from real big data ills that need
equally genuine cures.
http://cwonline.computerworld.com/t/8881632/823929835/662475/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~
Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection
solution for two decades. But, where most competitors focus exclusively on
Backup and Restore, TSM is a far more comprehensive data-protection solution.
http://cwonline.computerworld.com/t/8881632/823929835/662476/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2488bff1
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. 20 infamous security vendor break-ins
http://cwonline.computerworld.com/t/8881632/823929835/662477/19/
2. Experts warn against judging Firefox on its poor Pwn2Own performance
http://cwonline.computerworld.com/t/8881632/823929835/662478/20/
3. Darlene Storm: Government [redacted] transparency: 7 of 15 federal agencies graded 'F' in FOIA
http://cwonline.computerworld.com/t/8881632/823929835/662479/21/
4. Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
http://cwonline.computerworld.com/t/8881632/823929835/662480/28/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~
Prolexic issues Cybersecurity threat: NTP Amplification
As the security community scrambles to reduce the number of vulnerable NTP
servers, attackers find ways to hit harder with fewer servers.
http://cwonline.computerworld.com/t/8881632/823929835/662481/29/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20 infamous security vendor break-ins
Here are 20 of the most notorious known break-ins over the past decade.
http://cwonline.computerworld.com/t/8881632/823929835/662477/30/
Experts warn against judging Firefox on its poor Pwn2Own performance
Mozilla Firefox was the loser in this year's Pwn2Own hackfest, but experts warn
against placing too much importance on the number of zero-day vulnerabilities
found in the Web browser.
http://cwonline.computerworld.com/t/8881632/823929835/662478/31/
~~~~~~~~~~~~~~~~~~~WEBCAST: Druva~~~~~~~~~~~~~~~~~~~~~
Druva inSync: Endpoint Data Protection & Governance
75% of today's workforce is mobile, so you now need to think about protecting
corporate data on laptops and mobile devices. Druva inSync's integrated solution
enables you to effectively protect and govern this endpoint data.
http://cwonline.computerworld.com/t/8881632/823929835/662482/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=49fbbf79
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Government [redacted] transparency: 7 of 15 federal agencies graded 'F' in FOIA
It's Sunshine Week, but government transparency is still hard to find. Federal
agencies, like DHS for example, are failing to respond to Freedom of Information
Act requests. 7 of 15 agencies received the grade of "F." Half of all federal
agencies don't bother to update their FOIA regulations and 2013 weighed in as
the most-censored year yet.
http://cwonline.computerworld.com/t/8881632/823929835/662479/33/
Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
Mozilla on Tuesday patched five vulnerabilities exploited by researchers last
week at the Pwn2Own hacking contest, where they were awarded $200,000 for their
collective efforts.
http://cwonline.computerworld.com/t/8881632/823929835/662480/34/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8881632/823929835/641183/35/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8881632/823929835/643300/36/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8881632/823929835/604375/37/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8881632/823929835/598565/38/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?
http://cwonline.computerworld.com/t/8881632/823929835/659292/39/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8881632/823929835/156832/40/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8881632/823929835/311619/41/
Facebook: http://cwonline.computerworld.com/t/8881632/823929835/311620/42/
Twitter: http://cwonline.computerworld.com/t/8881632/823929835/311621/43/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8881632/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODgxNjMy&x=53dd2f11
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8881632/823929835/72510/45/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8881632/823929835/231613/46/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8881632/823929835/72509/47/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Thursday, March 20, 2014
Can 'data lakes' solve cloud security challenges?
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:24 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment