Computerworld Security: Issues and Trends: July 29, 2015
===============================================================
Security suites: Choosing the best one for you
These days, security suites do more than protect you from malware -- they handle
phishing, lost mobile devices and a multitude of other tasks. We find out which
are appropriate for your needs.
http://cwonline.computerworld.com/t/9239712/823929840/748891/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=317639d7
~~~~~~~~~~~~~~~~~~~WHITE PAPER: LogRhythm~~~~~~~~~~~~~~~~~~~~~
Understanding the Advanced Persistent Threat
Due to the difficulty of detection, APTs are a growing concern in the security
industry. Traditional security tools must be combined with Security Intelligence
to properly detect and respond to APTs.
http://cwonline.computerworld.com/t/9239712/823929840/748892/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d96a7797
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Google offers users of its Compute Engine their own encryption keys
http://cwonline.computerworld.com/t/9239712/823929840/748893/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c99b4720
2. What we can learn from JPMorgan's insider breaches
http://cwonline.computerworld.com/t/9239712/823929840/748894/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e898bc9c
3. Free tools to find out if your computer is infected with Hacking Team malware
http://cwonline.computerworld.com/t/9239712/823929840/748895/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c3a53ee7
4. When the good guys are wielding the lasers
http://cwonline.computerworld.com/t/9239712/823929840/748896/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b20429b8
5. Microsoft to pay $320M for cloud security provider Adallom, report says
http://cwonline.computerworld.com/t/9239712/823929840/748897/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b61ecb74
6. Senators call for investigation of potential safety, security threats from connected cars
http://cwonline.computerworld.com/t/9239712/823929840/748898/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a859d742
7. Firewalls can't protect today's connected cars
http://cwonline.computerworld.com/t/9239712/823929840/748899/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=be61bf6b
8. Regulators push to limit security software exports
http://cwonline.computerworld.com/t/9239712/823929840/748900/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=4709b612
~~~~~~~~~~~~~~~~~~~WEBCAST: CDW~~~~~~~~~~~~~~~~~~~~~
Security Alert: Key Components of Breach Containment
229 days. That's the median number of days attackers were present on a victim's
network before they were discovered according to the 2014 Verizon Data Breach
Report. That sobering statistic brings to light how ill prepared organizations
still are at preventing an attack.
http://cwonline.computerworld.com/t/9239712/823929840/748901/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3692c472
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google offers users of its Compute Engine their own encryption keys
Google will let enterprise customers of one of its Cloud Platform services lock
up their data with their own encryption keys, in case they're concerned about
the company snooping on their corporate information.
http://cwonline.computerworld.com/t/9239712/823929840/748893/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c88b83f5
What we can learn from JPMorgan's insider breaches
Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the
FBI on charges of stealing customer data and trying to sell it. Similar
incidents have occurred multiple times at JPMC over the past few years. Upon
closer inspection a common thread emerges from each of these incidents -- JPMC's
inability to account for insider threats.
http://cwonline.computerworld.com/t/9239712/823929840/748894/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=73109789
Free tools to find out if your computer is infected with Hacking Team malware
Rook Security offers Milano, a free tool to scan your PC for any possible
Hacking Team malware infection. Facebook offers osquery to detect Hacking Team's
Remote Control System on OS X. Lookout has mobile covered and can detect
surveillance malware on Android and iOS platforms.
http://cwonline.computerworld.com/t/9239712/823929840/748895/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=cb279077
When the good guys are wielding the lasers
Lasers can be used to steal sensitive data, even over long distances. New
research at MIT shows that they can also be used to protect data. From the IDG
Contributor Network.
http://cwonline.computerworld.com/t/9239712/823929840/748896/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=76cfd360
~~~~~~~~~~~~~~~~~~~WHITE PAPER: HP~~~~~~~~~~~~~~~~~~~~~
Understanding Advanced Threats and How to Mitigate Them
When you're a hacker, time is on your side. Time to find a soft spot in your
armor, to evade defenses, to seek out your most critical data. Increasingly,
today's advanced threats circumvent traditional defenses—even sandboxing. You
need a new approach.
http://cwonline.computerworld.com/t/9239712/823929840/748902/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c48858d1
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft to pay $320M for cloud security provider Adallom, report says
Microsoft is said to be paying $320 million to acquire Adallom, a cloud security
provider whose services might help Microsoft in its new push toward becoming a
"cloud-first" company.
http://cwonline.computerworld.com/t/9239712/823929840/748897/39/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=9e2edd1d
Senators call for investigation of potential safety, security threats from connected cars
U.S. Sens. Edward Markey and Richard Blumenthal urged the National Highway
Traffic Safety Administration to investigate potential widespread risk for
consumers because of vulnerabilities in auto information and entertainment
systems.
http://cwonline.computerworld.com/t/9239712/823929840/748898/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a1781ba5
Firewalls can't protect today's connected cars
While the automobile industry pursues more secure internal bus architectures,
security experts say no network firewall will ever be totally secure, and it's
more important to be able to detect and stop an attack rather than blocking it.
http://cwonline.computerworld.com/t/9239712/823929840/748899/41/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d3f91297
Regulators push to limit security software exports
The comment period ends soon, and the rules, as written, would severely restrict
international sales, deployment, research and even discussion of cybersecurity
tools and exploits, experts say.
http://cwonline.computerworld.com/t/9239712/823929840/748900/42/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7582b4a6
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9239712/823929840/724679/43/
Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 31.
http://cwonline.computerworld.com/t/9239712/823929840/736669/44/
Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
here: http://cwonline.computerworld.com/t/9239712/823929840/738200/45/
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT
practitioners about the technology, business opportunities and challenges you
face everyday. We invite you to participate by applying to be a contributor
today.
http://cwonline.computerworld.com/t/9239712/823929840/689530/46/
Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9239712/823929840/741285/47/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9239712/823929840/641183/48/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9239712/823929840/689330/49/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9239712/823929840/689330/50/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9239712/823929840/156832/51/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9239712/823929840/311619/52/
Facebook: http://cwonline.computerworld.com/t/9239712/823929840/311620/53/
Twitter: http://cwonline.computerworld.com/t/9239712/823929840/311621/54/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9239712/823929840/131135/55/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89OTIzOTcxMg%3d%3d&x=ed2deb56
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9239712/823929840/689329/56/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9239712/823929840/689329/57/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9239712/823929840/689331/58/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, July 29, 2015
Security suites: Choosing the best one for you
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 8:12 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment