Friday, March 27, 2015

Security best practices for users: Your first line of defense

Computerworld Security: March 27, 2015
===============================================================

Security best practices for users: Your first line of defense

Most savvy businesses are on top of their game when it comes to securing
networks, encrypting sensitive data and keeping private customer information
safe. But there's a glaring security vulnerability you may not have thought of:
your end-users.
http://cwonline.computerworld.com/t/9153250/823929835/726163/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5552c8bc

~~~~~~~~~~~~~~~~~~~WEBCAST: IBM Corporation~~~~~~~~~~~~~~~~~~~~~

Sharing Data between Clusters

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM
Elastic Storage to improve the power of their voice recognition applications by
managing storage growth, cost and complexity while increasing performance.

http://cwonline.computerworld.com/t/9153250/823929835/726164/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0a42cc78

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Cisco patches autonomic networking flaws in IOS routers, switches
http://cwonline.computerworld.com/t/9153250/823929835/726165/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a5f4d8ec

2. Many password strength meters are downright WEAK, say researchers
http://cwonline.computerworld.com/t/9153250/823929835/726166/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3b702d83

3. IDG Contributor Network: More tales of security fails
http://cwonline.computerworld.com/t/9153250/823929835/726167/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=042144c3

4. 9 security gadgets for mobile devices
http://cwonline.computerworld.com/t/9153250/823929835/726168/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c89fdce7

5. Tech companies call on US to end bulk collection of metadata
http://cwonline.computerworld.com/t/9153250/823929835/726169/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=04508448


~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Information Lifecycle Governance Requirements Kit

Use this requirements kit from CGOC to find the tools and technology you need.

http://cwonline.computerworld.com/t/9153250/823929835/726170/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8d9b481d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cisco patches autonomic networking flaws in IOS routers, switches

The flaws could allow attackers to gain limited access over affected devices or
to disrupt their normal operation
http://cwonline.computerworld.com/t/9153250/823929835/726165/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=0ce1d81b

Many password strength meters are downright WEAK, say researchers

Website password strength meters, like a spouse asked to assess your haircut or
outfit, often tell you only what you want to hear. That's the finding from
researchers at Concordia University in Montreal, who examined the usefulness of
those pesky and ubiquitous red-yellow-green password strength testers on
websites run by big names such as Google, Yahoo, Twitter and Microsoft/Skype.
http://cwonline.computerworld.com/t/9153250/823929835/726166/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=92f1b329

~~~~~~~~~~~~~~~~~~~WHITE PAPER: StackIQ~~~~~~~~~~~~~~~~~~~~~

Warehouse-grade at Speed of Web-scale IT

This white paper discusses the new realities and challenges faced by enterprise
datacenters, and table stakes for a complete Warehouse-grade automation
platform.

http://cwonline.computerworld.com/t/9153250/823929835/726171/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a25fbd4d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IDG Contributor Network: More tales of security fails

Security experts continue to dish on mistakes companies make with their online
protection.
http://cwonline.computerworld.com/t/9153250/823929835/726167/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a129ba3c

9 security gadgets for mobile devices

If you use your smartphone or tablet for work, you need to keep your data secure
when you're on the go. We look at nine gadgets that try to keep your important
data out of the hands of others.
http://cwonline.computerworld.com/t/9153250/823929835/726168/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b4359b2d

Tech companies call on US to end bulk collection of metadata

A slew of tech companies have joined privacy groups in calling for the U.S.
government to reform its surveillance practices.
http://cwonline.computerworld.com/t/9153250/823929835/726169/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ccfe6c54



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Computerworld's 2015 Data+ Editors' Choice Awards: A Call for Case Studies

Is your organization mining data for analysis, prediction and/or boosting the
bottom line? Submit your case study today. We will showcase a select group of
the most innovative and fascinating projects in a special online package in
September.

To submit a case study, visit http://cwonline.computerworld.com/t/9153250/823929835/723970/37/

Please email specialprojects@computerworld.com with any questions.


Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9153250/823929835/724679/38/


Computerworld's April Digital Magazine
Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The April edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9153250/823929835/725884/39/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9153250/823929835/641183/40/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9153250/823929835/689330/41/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9153250/823929835/689330/42/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9153250/823929835/156832/43/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9153250/823929835/311619/44/

Facebook: http://cwonline.computerworld.com/t/9153250/823929835/311620/45/

Twitter: http://cwonline.computerworld.com/t/9153250/823929835/311621/46/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9153250/823929835/131135/47/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MTUzMjUw&x=ae9031ca

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9153250/823929835/689329/48/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9153250/823929835/689329/49/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9153250/823929835/689331/50/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:15 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive