Tuesday, November 25, 2014

Network security needs big data

Computerworld Security: November 25, 2014
===============================================================

Network security needs big data

As the inadequacies of perimeter-centric defenses become clearer, the zero-trust
model grows more appealing. As for ZTM, it will need big data to succeed.
http://cwonline.computerworld.com/t/9071995/823929835/707189/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=9527ba27

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix Systems~~~~~~~~~~~~~~~~~~~~~

Best Practices in Choosing and Implementing MDM and EMM

Mobility and security specialists are carefully considering enetrprise mobility
management solutions. In this report Garner takes a look at best practices for
evaluating and selecting an EMM solution.

http://cwonline.computerworld.com/t/9071995/823929835/707190/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d2c49ac8

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. 'Less' is more to malware authors targeting Linux users
http://cwonline.computerworld.com/t/9071995/823929835/707191/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3cb524e9

2. INSIDER: How to create seamless mobile security for employees
http://cwonline.computerworld.com/t/9071995/823929835/707192/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=62b2e9c5

3. Regin: Giving IT security reason to hope NSA is waaaay ahead on malware
http://cwonline.computerworld.com/t/9071995/823929835/707193/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=895280af

4. Detekt tool finds the Hacking Team's secret surveillance malware on PC
http://cwonline.computerworld.com/t/9071995/823929835/707194/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=bc59baa9

5. Regin malware linked to attacks on Belgacom and a well-known cryptographer
http://cwonline.computerworld.com/t/9071995/823929835/707195/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b159ec2f


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix Systems~~~~~~~~~~~~~~~~~~~~~

Secure application delivery for a mobile workforce

Empowering people to use Windows applications and native mobile apps on any type
of device—with full security

http://cwonline.computerworld.com/t/9071995/823929835/707196/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=98ad7fe6

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

'Less' is more to malware authors targeting Linux users

Using the "less" Linux command to view the contents of files downloaded from the
Internet is a dangerous operation that can lead to remote code execution.
http://cwonline.computerworld.com/t/9071995/823929835/707191/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=de9cdcbe

INSIDER: How to create seamless mobile security for employees

If your organization's security procedures are disruptive and clunky, frustrated
employees will figure out how to get around them. Here's how three companies
created a secure and seamless experience for end users.
http://cwonline.computerworld.com/t/9071995/823929835/707192/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a5a2e492

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~

Conquering the Top 5 Enterprise Data Protection Challenges

How are today's CIO's overcoming today's datacenter challenges? IT must push for
100% virtualization, simplified disaster recovery systems, and efficient data
protection solutions to achieve greater administrative efficiencies and meet
these demands.

http://cwonline.computerworld.com/t/9071995/823929835/707197/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a37ea749

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Regin: Giving IT security reason to hope NSA is waaaay ahead on malware

U.S. IT security people had better hope Russia and China have nothing as
sophisticated as Regin spyware
http://cwonline.computerworld.com/t/9071995/823929835/707193/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=57b13bef

Detekt tool finds the Hacking Team's secret surveillance malware on PC

If you've ever wondered if the government has you under surveillance via your
PC, then you need to run the new and free malware detection tool Detekt. It has
already found traces of the Hacking Team's surveillance malware, but it also
hunts for remote control system toolkits created by FinFisher as well as other
remote access Trojans (RAT) like DarkComet RAT, XtremeRAT, BlackShades RAT,
njRAT, ShadowTech RAT, and Gh0st RAT.
http://cwonline.computerworld.com/t/9071995/823929835/707194/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6f61b93c

Regin malware linked to attacks on Belgacom and a well-known cryptographer

After Symantec blew the lid on Regin on Sunday, computer security experts and
companies say information has led to suspicions that the U.S. and U.K. are
involved.
http://cwonline.computerworld.com/t/9071995/823929835/707195/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=bcef9ea5



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Digital Spotlight: Mobile Security

Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9071995/823929835/693449/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=90786bc9

Take our Salary Survey!

Computerworld's 2015 Salary Survey: How will your salary compare with your IT
peers? Computerworld's 29th Annual Salary Survey will feature the latest IT
salary trends and advice on where to find the best-paying jobs. This year's
survey participants can enter a drawing to win one of 3 American Express gift
cards for $500 each! The drawing is open to legal U.S. residents, age 18 or
older.

Take our annual Salary Survey today! tinyurl.com/m9erxtl


Is your IT department a great place to work?

Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 22d annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 14, 2014:
http://cwonline.computerworld.com/t/9071995/823929835/701013/38/

Computerworld's Digital Magazine

Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The November edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9071995/823929835/701746/39/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9071995/823929835/641183/40/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9071995/823929835/689330/41/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9071995/823929835/689330/42/

Join the Computerworld conversation on Google+

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/9071995/823929835/598565/43/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9071995/823929835/156832/44/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9071995/823929835/311619/45/

Facebook: http://cwonline.computerworld.com/t/9071995/823929835/311620/46/

Twitter: http://cwonline.computerworld.com/t/9071995/823929835/311621/47/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9071995/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MDcxOTk1&x=704b32d6

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9071995/823929835/689329/49/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9071995/823929835/689329/50/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9071995/823929835/689331/51/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:18 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive