Computerworld Security: June 25, 2014
===============================================================
Montana data breach exposes 1.3 million personal records
Up to 1.3 million records, including health care and bank account information,
may have been exposed after a server at Montana's public health department was
hacked in May, the state said Tuesday.
http://cwonline.computerworld.com/t/8953727/823929835/677653/17/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: SolarWinds~~~~~~~~~~~~~~~~~~~~~
Champagne SIEM on a Beer Budget
The SolarWinds Log & Event Manager is an excellent option for all sizes of
organizations wanting to increase the security of their networks by keeping an
eye on their security-related log data without breaking the bank.
http://cwonline.computerworld.com/t/8953727/823929835/677654/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=856e8706
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. New software targets hard-to-understand privacy policies
http://cwonline.computerworld.com/t/8953727/823929835/677655/19/
2. Encrypted Web traffic can reveal highly sensitive information
http://cwonline.computerworld.com/t/8953727/823929835/677656/20/
3. New Havex malware variants target industrial control system, SCADA users
http://cwonline.computerworld.com/t/8953727/823929835/677657/21/
4. Police turning to mobile malware for monitoring
http://cwonline.computerworld.com/t/8953727/823929835/677658/28/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Sophos, Inc.~~~~~~~~~~~~~~~~~~~~~
Endpoint Buyer's Guide
Evaluating the many components that make up an endpoint security solution may
seem overwhelming. Get independent research and test results to help you
determine your requirements and identify the vendor that best meets your needs.
http://cwonline.computerworld.com/t/8953727/823929835/677659/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=cc4c0130
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
New software targets hard-to-understand privacy policies
Have you ever tried to read a website's privacy policy only to give up after
slogging through paragraphs and paragraphs of dense, lawyerly language?
Privacy-focused companies Disconnect and TRUSTe have released a new browser
add-on that attempts to translate those policies into easy-to-understand terms.
http://cwonline.computerworld.com/t/8953727/823929835/677655/30/
Encrypted Web traffic can reveal highly sensitive information
Analyzing encrypted Web traffic can potentially reveal highly sensitive
information such as medical conditions and sexual orientation, according to a
research paper that forecasts how privacy on the Internet may erode.
http://cwonline.computerworld.com/t/8953727/823929835/677656/31/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: EMC Corporation~~~~~~~~~~~~~~~~~~~~~
Why Customers Deploy a Flash 1st Strategy on EMC VNX Storage
Read why with a FLASH 1st strategy, customers don't need to compromise between
performance and TCO.
http://cwonline.computerworld.com/t/8953727/823929835/677660/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=045d14f3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
New Havex malware variants target industrial control system, SCADA users
A malware threat previously used in attacks against energy sector companies is
now being aimed at organizations that use or develop industrial applications and
machines.
http://cwonline.computerworld.com/t/8953727/823929835/677657/33/
Police turning to mobile malware for monitoring
Governments are increasingly using spyware for mobile devices to monitor
targets, raising questions over the possible misuse of such tools, a new study
suggests.
http://cwonline.computerworld.com/t/8953727/823929835/677658/34/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8953727/823929835/641183/35/
YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES
In this special issue, we examine the biggest challenges with big data projects,
including the immaturity of the tools, a lack of people with expertise in big
data technologies, the challenge of making the right investments and hardware
that can't handle big data projects.
This free, 17-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8953727/823929835/664231/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b313ea84
DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD
In our in-depth report, we look at the lessons learned from early adopters about
ramping up, scaling back and avoiding disasters in the cloud. We'll also tell
you why IT pros with cloud chops have seen their fortunes rise and offer tips on
how to hammer out an iron-clad cloud service agreement.
This free, 28-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8953727/823929835/668561/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a1c84bf6
INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/8953727/823929835/669786/38/
SUBSCRIBE TO COMPUTERWORLD DAILY NEWS
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/8953727/823929835/673015/39/
DIGITAL SPOTLIGHT: CONSUMERIZATION
Learn how four long-time BYOD implementers have changed their focus to keep up
with morphing requirements, especially with regards to locking down corporate
data.
http://cwonline.computerworld.com/t/8953727/823929835/675125/40/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f01852ec
Computerworld's Premier 100 IT Leaders 2015
Computerworld has launched its annual search for technology professionals who
have demonstrated leadership in their organizations through the use of IT and
have the strategic vision to align technology with business goals.
Nominations are being collected now through Friday, July 18.
http://cwonline.computerworld.com/t/8953727/823929835/675126/41/
For more information about the program, please visit our website at:
http://cwonline.computerworld.com/t/8953727/823929835/567051/42/
Questions? Please email us at: Premier100@computerworld.com
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8953727/823929835/604375/43/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8953727/823929835/598565/44/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Amazon has finally unveiled its first smartphone, the Amazon Fire, with a number
of new and interesting features, like Dynamic Perspective and the Firefly
button. Do you think Amazon's smartphone will be a hit or a miss?
http://cwonline.computerworld.com/t/8953727/823929835/676958/45/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8953727/823929835/156832/46/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8953727/823929835/311619/47/
Facebook: http://cwonline.computerworld.com/t/8953727/823929835/311620/48/
Twitter: http://cwonline.computerworld.com/t/8953727/823929835/311621/49/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8953727/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTUzNzI3&x=c6c71355
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8953727/823929835/72510/51/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8953727/823929835/231613/52/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8953727/823929835/72509/53/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, June 25, 2014
Montana data breach exposes 1.3 million personal records
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:59 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment