Computerworld Security: May 29, 2015
===============================================================
5 tips for keeping your incident response team happy
These highly skilled, multitasking, (slightly unconventional) security rock
stars have a lot to offer beyond security fire drills and threat research.
http://cwonline.computerworld.com/t/9199782/823929835/737149/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d309a483
~~~~~~~~~~~~~~~~~~~WHITE PAPER: NexGen Storage~~~~~~~~~~~~~~~~~~~~~
Tapping the True Value of Data
Not all data has equal value, yet storage and data management solutions treat
diverse data uniformly. Taking a value-driven approach can take the pain out of
data management and deliver predictable application performance for a top-notch
user experience.
http://cwonline.computerworld.com/t/9199782/823929835/737150/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=20fddbe3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. How employees put your organization at risk
http://cwonline.computerworld.com/t/9199782/823929835/737151/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3ffd3f47
2. Wi-Fi access point scans can betray a person's location
http://cwonline.computerworld.com/t/9199782/823929835/737152/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=89497ae2
3. Majority of websites have serious vulnerabilities
http://cwonline.computerworld.com/t/9199782/823929835/737153/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=cddd3b6d
~~~~~~~~~~~~~~~~~~~: Alert Logic~~~~~~~~~~~~~~~~~~~~~
A guidebook to successful PCI DSS 3.0 compliance
This eBook removes the guesswork and explains the changes included in the PCI
DSS 3.0 standard. It drills down on new requirements and highlights a few
examples of what to watch out for in PCI compliance.
http://cwonline.computerworld.com/t/9199782/823929835/737154/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=860c6025
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How employees put your organization at risk
Security threats don't come only from the outside. The biggest threats are often
sitting right in the office. Whether it's adult websites or social media,
employees are accessing content that puts your business at risk.
http://cwonline.computerworld.com/t/9199782/823929835/737151/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=47bea97c
~~~~~~~~~~~~~~~~~~~WEBCAST: IBM Corporation~~~~~~~~~~~~~~~~~~~~~
Privacy By Design
IBM has worked with many enterprise and global organizations to understand their
unique needs to secure and protect their big data environments. These
organizations are employing a risk-based strategy to their projects. Hear more
about the key steps and approach to take to understanding the risks and then
covering the potential exposure.
http://cwonline.computerworld.com/t/9199782/823929835/737155/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=296d82c5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Wi-Fi access point scans can betray a person's location
Many Android applications collect information on Wi-Fi access points, which
researchers contend can be used to figure out where a person is more than 90
percent of the time.
http://cwonline.computerworld.com/t/9199782/823929835/737152/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=fd8cc092
Majority of websites have serious vulnerabilities
In a recent analysis of more than 30,000 websites, most had at least one serious
vulnerability for 150 or more days last year
http://cwonline.computerworld.com/t/9199782/823929835/737153/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=982577f6
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9199782/823929835/724679/33/
Computerworld's 2016 Premier 100 IT Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close June 30.
http://cwonline.computerworld.com/t/9199782/823929835/736669/34/
IT Salary Survey 2015: Cash Is Back!
In the May digital magazine: Computerworld's 29th annual salary survey reveals
salaries for dozens of IT titles, plus tech pros' top concerns, career prospects
and more. Also: Are you overlooking tech talent that's right under your nose?
[Registration required]
http://cwonline.computerworld.com/t/9199782/823929835/732030/35/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9199782/823929835/641183/36/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9199782/823929835/689330/37/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9199782/823929835/689330/38/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9199782/823929835/156832/39/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9199782/823929835/311619/40/
Facebook: http://cwonline.computerworld.com/t/9199782/823929835/311620/41/
Twitter: http://cwonline.computerworld.com/t/9199782/823929835/311621/42/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9199782/823929835/131135/43/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MTk5Nzgy&x=c996a44e
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9199782/823929835/689329/44/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9199782/823929835/689329/45/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9199782/823929835/689331/46/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, May 29, 2015
5 tips for keeping your incident response team happy
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:51 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment