Computerworld Security: August 01, 2014
===============================================================
CISOs still struggle for respect from peers
Chief information security officers (CISOs) continue to have a hard time gaining
the respect of other C-suite executives despite the heightened focus overall on
information security.
http://cwonline.computerworld.com/t/8985178/823929835/684079/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO Perspective~~~~~~~~~~~~~~~~~~~~~
Save the Date: Boston-Area CSO Perspectives Conference 9/16
The Boston-area CSO Perspectives Conference is being held on Tuesday, September
16 at the Sheraton Framingham Hotel. At this one-day event, produced by CSO and
focused on "Defending Against the Pervasive Attacker," you'll have the
opportunity to connect with an extensive network of visionary CSOs, CIOs and
business experts.
http://cwonline.computerworld.com/t/8985178/823929835/683554/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Security Manager's Journal: A ransomware flop, thanks to security awareness
http://cwonline.computerworld.com/t/8985178/823929835/684080/19/
2. In a hyper-social world, some seek a little privacy
http://cwonline.computerworld.com/t/8985178/823929835/684081/20/
3. Microsoft ordered to turn over customer data stored in the cloud
http://cwonline.computerworld.com/t/8985178/823929835/684082/21/
4. Some are twisting the facts in requests to be forgotten, Google says
http://cwonline.computerworld.com/t/8985178/823929835/684083/28/
5. Attackers exploit remote access tools to compromise retail systems
http://cwonline.computerworld.com/t/8985178/823929835/684084/29/
6. The CIA improperly accessed Senate computers
http://cwonline.computerworld.com/t/8985178/823929835/684085/30/
~~~~~~~~~~~~~~~~~~~WEBCAST: Fortinet~~~~~~~~~~~~~~~~~~~~~
Why are customers really deploying an NGFW?
Next Generation Firewall (NGFW). It seems every IT Security expert is talking
about them, but what are people really doing? This webcast covers 5 real-world
customer deployments and explores business drivers, key requirements, solutions
considered and the final deployment.
http://cwonline.computerworld.com/t/8985178/823929835/684086/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3719e025
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security Manager's Journal: A ransomware flop, thanks to security awareness
Only one person clicks on a bad link, and she had all her files properly backed
up. Maybe employees aren't a security manager's nightmare after all.
http://cwonline.computerworld.com/t/8985178/823929835/684080/32/
In a hyper-social world, some seek a little privacy
After years of cajoling their users into sharing every thought, emotion and
selfie, online firms are seeing that providing more private online spaces might
also be profitable.
http://cwonline.computerworld.com/t/8985178/823929835/684081/33/
Microsoft ordered to turn over customer data stored in the cloud
Microsoft has been ordered to comply with a U.S. government demand for a
customer's emails stored on a company server in Dublin, Ireland.
http://cwonline.computerworld.com/t/8985178/823929835/684082/34/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed Technology~~~~~~~~~~~~~~~~~~~~~
Riverbed Optimization System: Technical Overview
The Riverbed Optimization System (RiOS™) powers Riverbed's unique line of
SteelHead™ application acceleration appliances and Steelhead Mobile client
software. RiOS is based on technologies that solve a range of problems affecting
wide area networks (WANs) and application performance.
http://cwonline.computerworld.com/t/8985178/823929835/684087/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=85b7e757
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some are twisting the facts in requests to be forgotten, Google says
Some of those seeking to scrub their histories from the Web under Europe's
"right to be forgotten" rule are being economical with the truth when making
their requests, Google said Thursday.
http://cwonline.computerworld.com/t/8985178/823929835/684083/36/
Attackers exploit remote access tools to compromise retail systems
Malicious hackers are using remote access tools to break into retail
point-of-sale systems and plant malware on them, the Department of Homeland
Security warned.
http://cwonline.computerworld.com/t/8985178/823929835/684084/37/
The CIA improperly accessed Senate computers
An internal CIA investigation has determined its employees improperly accessed
computers used by the Senate Intelligence Committee while it was working on a
report about the agency's post-9/11 detention and interrogation program,
according to a report by McClatchy.
http://cwonline.computerworld.com/t/8985178/823929835/684085/38/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8985178/823929835/641183/39/
INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/8985178/823929835/669786/40/
SUBSCRIBE TO COMPUTERWORLD DAILY NEWS
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/8985178/823929835/673015/41/
DIGITAL SPOTLIGHT: CONSUMERIZATION
Learn how four long-time BYOD implementers have changed their focus to keep up
with morphing requirements, especially with regards to locking down corporate
data.
http://cwonline.computerworld.com/t/8985178/823929835/675125/42/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2de5f071
Computerworld's Premier 100 IT Leaders 2015
Computerworld has launched its annual search for technology professionals who
have demonstrated leadership in their organizations through the use of IT and
have the strategic vision to align technology with business goals.
Nominations are being collected now through Friday, July 25.
http://cwonline.computerworld.com/t/8985178/823929835/675126/43/
For more information about the program, please visit our website at:
http://cwonline.computerworld.com/t/8985178/823929835/567051/44/
Questions? Please email us at: Premier100@computerworld.com
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8985178/823929835/598565/45/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Apple is releasing its first public beta of OS X Yosemite. Is that a smart move?
http://cwonline.computerworld.com/t/8985178/823929835/682409/46/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8985178/823929835/156832/47/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8985178/823929835/311619/48/
Facebook: http://cwonline.computerworld.com/t/8985178/823929835/311620/49/
Twitter: http://cwonline.computerworld.com/t/8985178/823929835/311621/50/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8985178/823929835/131135/51/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTg1MTc4&x=e71c7616
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8985178/823929835/72510/52/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8985178/823929835/231613/53/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8985178/823929835/72509/54/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, August 1, 2014
CISOs still struggle for respect from peers
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment