Computerworld Security: March 07, 2014
===============================================================
Cisco patches flaws in routers, wireless LAN controllers
Cisco Systems released new firmware versions for some of its small business
routers and wireless LAN controllers in order to address vulnerabilities that
could allow remote attackers to compromise the vulnerable devices or affect
their availability.
http://cwonline.computerworld.com/t/8872293/823929835/660392/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~
The Future of IT: Putting the Customer First
IT is adapting to this new world of consumerized technology, and focusing on its
own employees as internal customers.
http://cwonline.computerworld.com/t/8872293/823929835/660393/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=97d835f9
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Tracking metadata can be useful -- and proper
http://cwonline.computerworld.com/t/8872293/823929835/660394/19/
2. Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
http://cwonline.computerworld.com/t/8872293/823929835/660395/20/
3. Microsoft plans to patch critical under-attack IE bug next week
http://cwonline.computerworld.com/t/8872293/823929835/660396/21/
4. Defining how a no-holds-barred Russia-Ukraine cyberwar would play out
http://cwonline.computerworld.com/t/8872293/823929835/660397/28/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: SAS~~~~~~~~~~~~~~~~~~~~~
The Impact of Customer-Centric Marketing on Manufacturers
Manufacturers have traditionally fostered close relationships with retailers and
channel partners who sell their products rather than interacting directly with
consumers. But this is changing. Learn how manufacturers can succeed in this new
era of customer-centric manufacturing.
http://cwonline.computerworld.com/t/8872293/823929835/660398/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=721b5bb4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Tracking metadata can be useful -- and proper
Metadata has had a bad rap lately, with disclosures tying its collection to
government spying programs. But those bits of information lurking behind our
phone calls, photos and online chats can be useful in other ways if they're
harnessed properly.
http://cwonline.computerworld.com/t/8872293/823929835/660394/30/
Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
And without remote management, getting patches onto devices scattered throughout
the organization is hit or miss.
http://cwonline.computerworld.com/t/8872293/823929835/660395/31/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: LogMeIn~~~~~~~~~~~~~~~~~~~~~
Five Tips for Improving Customer Experience
This paper conveys how the pressure to increase customer satisfaction metrics
with less funding will increase as companies look for new ways to differentiate
their services and reduce customer churn. Learn More.
http://cwonline.computerworld.com/t/8872293/823929835/660399/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=81ddf6b7
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft plans to patch critical under-attack IE bug next week
Microsoft will deliver five security updates to customers next week, two tagged
as "critical," including one that will quash the open vulnerability in Internet
Explorer that hackers have been exploiting since January.
http://cwonline.computerworld.com/t/8872293/823929835/660396/33/
Defining how a no-holds-barred Russia-Ukraine cyberwar would play out
With some opening shots in a cyber component to the war of nerves in the Ukraine
already fired, security analysts today offered a look at how a full-fledged
cyberwar in the region would unfold.
http://cwonline.computerworld.com/t/8872293/823929835/660397/34/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8872293/823929835/641183/35/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8872293/823929835/643300/36/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8872293/823929835/604375/37/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8872293/823929835/598565/38/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?
http://cwonline.computerworld.com/t/8872293/823929835/659292/39/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8872293/823929835/156832/40/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8872293/823929835/311619/41/
Facebook: http://cwonline.computerworld.com/t/8872293/823929835/311620/42/
Twitter: http://cwonline.computerworld.com/t/8872293/823929835/311621/43/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8872293/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODcyMjkz&x=770a7709
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8872293/823929835/72510/45/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8872293/823929835/231613/46/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8872293/823929835/72509/47/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, March 7, 2014
Cisco patches flaws in routers, wireless LAN controllers
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment