Computerworld Security: April 28, 2015
===============================================================
SendGrid resets passwords as investigation reveals deeper breach
SendGrid is resetting the passwords for all of its customers after an
investigation showed a cyberattack it sustained earlier this month was more
extensive than first realized.
http://cwonline.computerworld.com/t/9175704/823929835/731649/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=67945a0d
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Axway~~~~~~~~~~~~~~~~~~~~~
Ovum White Paper: Effective Data Flow Governance
1 out of 4 organizations have failed a security audit. Will you be one of them?
Ovum Consulting asked hundreds of executive-level IT buyers from around the
world some very tough questions about their ability to govern the flow of their
enterprise data.
http://cwonline.computerworld.com/t/9175704/823929835/731650/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3b0b375a
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. IDG Contributor Network: Reading between the lines -- Verizon 2015 Data Breach Investigations Report
http://cwonline.computerworld.com/t/9175704/823929835/731651/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7ab81d27
2. IDG Contributor Network: Security extortion? When legit disclosure morphs into a shakedown
http://cwonline.computerworld.com/t/9175704/823929835/731652/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a0dbafec
3. Lenovo ships free OS recovery media for Superfish-affected laptops
http://cwonline.computerworld.com/t/9175704/823929835/731653/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=70e80771
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Ixia~~~~~~~~~~~~~~~~~~~~~
Best Practices for Security Monitoring
This paper addresses the challenge that security professionals face in accessing
the right network data for problem resolution and anomaly analysis. It
introduces an innovation in network management and monitoring, the network
monitoring switch, a solid solution that provides visibility to the entire
network.
http://cwonline.computerworld.com/t/9175704/823929835/731654/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=4182e33e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IDG Contributor Network: Reading between the lines -- Verizon 2015 Data Breach Investigations Report
The annual Verizon Data Breach Investigations Report is one of the most
comprehensive reports on the state of information security available today. Here
are the findings that are important to most businesses, and suggested
remediations that can be readily applied.
http://cwonline.computerworld.com/t/9175704/823929835/731651/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=cbae1839
~~~~~~~~~~~~~~~~~~~WEBCAST: IBM Corporation~~~~~~~~~~~~~~~~~~~~~
Transform your Business with Advanced Analytics
Consumer expectations are changing; retailers today have challenges in all
fronts from acquiring to growing to retaining profitable customer base. 81% of
consumers expect the same brand experience across all channels.
http://cwonline.computerworld.com/t/9175704/823929835/731655/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bfd0126f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IDG Contributor Network: Security extortion? When legit disclosure morphs into a shakedown
The essence of security is not trusting that people will do the right thing.
Firewalls, deadbolts and armed guards exist to slow down or stop bad guys, not
to encourage good acts from good guys. With that in mind, let's look at how
companies today handle security holes and ask ourselves if this, alone, isn't
proof that humans are crazy.
http://cwonline.computerworld.com/t/9175704/823929835/731652/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=597040ef
Lenovo ships free OS recovery media for Superfish-affected laptops
Lenovo in February admitted to preloading Superfish on some consumer notebooks
Now the company has taken steps so the dangerous adware doesn't reappear when
users reinstall Windows.
http://cwonline.computerworld.com/t/9175704/823929835/731653/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=166b32d7
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Computerworld's 2015 Data+ Editors' Choice Awards: A Call for Case Studies
Is your organization mining data for analysis, prediction and/or boosting the
bottom line? Submit your case study today. We will showcase a select group of
the most innovative and fascinating projects in a special online package in
September.
To submit a case study, visit http://cwonline.computerworld.com/t/9175704/823929835/723970/33/
Please email specialprojects@computerworld.com with any questions.
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9175704/823929835/724679/34/
TELL US WHAT YOU THINK ABOUT UC AND COLLABORATION
Computerworld is conducting a survey on unified communications and
collaboration. Please share your opinions in our brief online survey and enter a
drawing for a chance to win $250: http://cwonline.computerworld.com/t/9175704/823929835/727411/35/
(All answers are confidential and will be reported only in the aggregate.)
Computerworld's April Digital Magazine
Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The April edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9175704/823929835/725884/36/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9175704/823929835/641183/37/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9175704/823929835/689330/38/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9175704/823929835/689330/39/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9175704/823929835/156832/40/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9175704/823929835/311619/41/
Facebook: http://cwonline.computerworld.com/t/9175704/823929835/311620/42/
Twitter: http://cwonline.computerworld.com/t/9175704/823929835/311621/43/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9175704/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MTc1NzA0&x=a76a9c25
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9175704/823929835/689329/45/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9175704/823929835/689329/46/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9175704/823929835/689331/47/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, April 28, 2015
SendGrid resets passwords as investigation reveals deeper breach
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:20 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment