Wednesday, March 26, 2014

In rare move, banks sue Target's security auditor

Computerworld Security: March 26, 2014
===============================================================

In rare move, banks sue Target's security auditor

Two banks that claim to have suffered losses from the recent data breach at
Target have sued Trustwave Holdings Inc., the company that was responsible for
validating Target's compliance with the Payment Card Industry Data Security
Standard.
http://cwonline.computerworld.com/t/8886107/823929835/663356/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference ~~~~~~~~~~~~~~~~~~~~~

FINAL DAYS to Register: CSO40 Security Confab + Awards

Please join us this March 31 – April 2, 2014 for CSO40 Security Confab + Awards.
Our program of fast-moving, rapid fire presentations delivered by leading CSO
and CISO thought leaders demonstrate how forward-thinking organizations are
embracing today's challenges and preparing for the future.

http://cwonline.computerworld.com/t/8886107/823929835/649203/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security Manager's Journal: Stopping vendors from making us a Target
http://cwonline.computerworld.com/t/8886107/823929835/663357/19/

2. Evan Schuman: Wal-Mart is latest big company with mobile-app security problems
http://cwonline.computerworld.com/t/8886107/823929835/663358/20/

3. Cybersecurity Expert and CIO: Internet of Things is 'Scary as Hell'
http://cwonline.computerworld.com/t/8886107/823929835/663359/21/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

Prolexic issues Cybersecurity threat: NTP Amplification

As the security community scrambles to reduce the number of vulnerable NTP
servers, attackers find ways to hit harder with fewer servers.

http://cwonline.computerworld.com/t/8886107/823929835/663360/28/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security Manager's Journal: Stopping vendors from making us a Target

The data breach suffered by Target could make it easier for our manager to make
some needed changes in his company's vendor management processes.
http://cwonline.computerworld.com/t/8886107/823929835/663357/29/

~~~~~~~~~~~~~~~~~~~WEBCAST: Druva~~~~~~~~~~~~~~~~~~~~~

Druva inSync: Endpoint Data Protection & Governance

75% of today's workforce is mobile, so you now need to think about protecting
corporate data on laptops and mobile devices. Druva inSync's integrated solution
enables you to effectively protect and govern this endpoint data.

http://cwonline.computerworld.com/t/8886107/823929835/663361/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=33f8deff

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Evan Schuman: Wal-Mart is latest big company with mobile-app security problems

The evidence keeps mounting that companies that put out mobile apps are not
paying nearly enough attention to security. Even big companies with large and
experienced IT staffs are guilty.
http://cwonline.computerworld.com/t/8886107/823929835/663358/31/

Cybersecurity Expert and CIO: Internet of Things is 'Scary as Hell'

The terms "Internet of Things" (IoT) and "connected home" are two of the
trendiest buzzwords in the technology world today. And while both clearly offer
very real potential, they also introduce their own share of risk, particularly
if they're not approached with caution, according to Jerry Irvine, an owner and
CIO of IT outsourcing services firm, Prescient Solutions.
http://cwonline.computerworld.com/t/8886107/823929835/663359/32/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8886107/823929835/641183/33/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8886107/823929835/643300/34/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8886107/823929835/604375/35/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8886107/823929835/598565/36/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Over the past year or so, smartphone innovation has hit a plateau. What do you
think phone makers should focus on to next to break the constraints of the
innovation curve?

http://cwonline.computerworld.com/t/8886107/823929835/663302/37/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8886107/823929835/156832/38/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8886107/823929835/311619/39/

Facebook: http://cwonline.computerworld.com/t/8886107/823929835/311620/40/

Twitter: http://cwonline.computerworld.com/t/8886107/823929835/311621/41/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8886107/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODg2MTA3&x=39fd2e04

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8886107/823929835/72510/43/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8886107/823929835/231613/44/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8886107/823929835/72509/45/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:13 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive