Wednesday, October 21, 2015

CSO salaries expected to skyrocket

Computerworld Security: Issues and Trends: October 21, 2015
===============================================================

INSIDER: CSO salaries expected to skyrocket

Recent report says CSO salaries could reach a quarter of a million dollars.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/9325132/823929840/766914/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e9466dba

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Teradata~~~~~~~~~~~~~~~~~~~~~

A New Strategic Approach to Data and Analytics

Many confuse the adoption of big data technology with creating a coherent big
data strategy and in the process are creating "big data debt". Learn the
concepts and guidelines that remedy that debt and increases your long-term
results by taking a new data and analytics centric approach.

http://cwonline.computerworld.com/t/9325132/823929840/766915/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c4c70049

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. CISA bill: Hated by Google, Facebook, Apple, Twitter, Reddit...
http://cwonline.computerworld.com/t/9325132/823929840/766916/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=040cb02b

2. Google, Yahoo tighten spam filtering
http://cwonline.computerworld.com/t/9325132/823929840/766917/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3b2b8e78

3. INSIDER: Drowning in security data? Here's how to make threat intel work for you
http://cwonline.computerworld.com/t/9325132/823929840/766918/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ea37bf8f

4. Is Apple's security honeymoon on OS X ending?
http://cwonline.computerworld.com/t/9325132/823929840/766919/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=68f335eb

5. Cyber insurers could help drive IoT standards
http://cwonline.computerworld.com/t/9325132/823929840/766920/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=58d310a5

6. INSIDER: Why you shouldn't trust cloud service providers
http://cwonline.computerworld.com/t/9325132/823929840/766921/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3cd33047

7. FireEye shows that even security products can have security holes
http://cwonline.computerworld.com/t/9325132/823929840/766922/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5d7af7e6

8. Western Digital self-encrypting hard disk drives have flaws that can expose data
http://cwonline.computerworld.com/t/9325132/823929840/766923/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2eafa99e

9. INSIDER: Application attacks against clouds up 45%
http://cwonline.computerworld.com/t/9325132/823929840/766924/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f62717a9

10. Why visibility and control are critical for container security
http://cwonline.computerworld.com/t/9325132/823929840/766925/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c4c87583

11. 9 reasons why users still struggle with online security
http://cwonline.computerworld.com/t/9325132/823929840/766926/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1ec12ee2

12. INSIDER: Road warriors are prime targets for hackers
http://cwonline.computerworld.com/t/9325132/823929840/766927/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e1e0ca0f

13. The dreaded risk assessment
http://cwonline.computerworld.com/t/9325132/823929840/766928/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1de5467d

14. Mind your analytics, or you could soon be in ethical hot water
http://cwonline.computerworld.com/t/9325132/823929840/766929/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=15060d30

15. Privacy watchdogs give EU, U.S. three months to negotiate new Safe Harbor deal
http://cwonline.computerworld.com/t/9325132/823929840/766930/39/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=69171130

16. To scare people better, Android ransomware gets a snazzy UI
http://cwonline.computerworld.com/t/9325132/823929840/766931/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ba05d881

17. INSIDER: IoT will become a matter of life or death for security pros
http://cwonline.computerworld.com/t/9325132/823929840/766932/41/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5f61bc30


~~~~~~~~~~~~~~~~~~~WEBCAST: VCE~~~~~~~~~~~~~~~~~~~~~

Are You Stuck in an Inefficient Upgrade Cycle?

Stuck in an inefficient upgrade cycle, A. Duie Pyle, a business offering
dedicated truckload and warehousing solutions, turned to VCE converged
solutions.

http://cwonline.computerworld.com/t/9325132/823929840/766933/42/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CISA bill: Hated by Google, Facebook, Apple, Twitter, Reddit...

The Cybersecurity Information Sharing Act (CISA) is being debated by the U.S.
Senate. But the very companies it purports to protect don't want it...
http://cwonline.computerworld.com/t/9325132/823929840/766916/43/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5fab11ac

Google, Yahoo tighten spam filtering

Google and Yahoo are expanding their use of a successful system used to detect
spam.
http://cwonline.computerworld.com/t/9325132/823929840/766917/44/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=26464bbe

INSIDER: Drowning in security data? Here's how to make threat intel work for you

Many companies think they know what the keys are to their kingdom and where the
entry points are located. Unfortunately, they soon find out that the most
serious breaches often take place somewhere else. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/9325132/823929840/766918/45/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d39487ef

Is Apple's security honeymoon on OS X ending?

Apple scored unforgettable hits against Microsoft with its Mac vs. PC ads, which
anthropomorphized Windows as a sneezing, miserable office worker.
http://cwonline.computerworld.com/t/9325132/823929840/766919/46/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=14c68704

Cyber insurers could help drive IoT standards

Cyber insurance premiums could prove a big driver of Internet of Things
standards as insurers look for strong, widely used tools to protect against data
breaches, IoT experts say.
http://cwonline.computerworld.com/t/9325132/823929840/766920/47/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=13d08309

INSIDER: Why you shouldn't trust cloud service providers

It's hard enough really trusting your own employees these days. So when it comes
to employees of cloud service providers, columnist Rob Enderle writes you
definitely shouldn't trust them. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9325132/823929840/766921/48/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3279f0f9

FireEye shows that even security products can have security holes

But we never should have assumed otherwise. Any product can have security holes,
and security vendors aren't exempt.
http://cwonline.computerworld.com/t/9325132/823929840/766922/49/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7ed54374

Western Digital self-encrypting hard disk drives have flaws that can expose data

The hardware-based encryption built into popular Western Digital external hard
disk drives has flaws that could allow attackers to recover data without knowing
the user password.
http://cwonline.computerworld.com/t/9325132/823929840/766923/50/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=dd9ea156

~~~~~~~~~~~~~~~~~~~WEBCAST: VCE~~~~~~~~~~~~~~~~~~~~~

VCE CEO Announces the Next Wave of Converged Infrastructure

Watch this video as the CEO of VCE, Praveen Akkiraju, and others from the VCE
executive team, detail the strategic vision for VCE and the latest solutions
that make IT simplicity a reality.

http://cwonline.computerworld.com/t/9325132/823929840/766934/51/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: Application attacks against clouds up 45%

Application attacks against clouds jumped 45% last year, according to a new
report. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9325132/823929840/766924/52/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=65846f25

Why visibility and control are critical for container security

New tools focus on the integrity of containers, but there's also the challenge
of ensuring the code constituting the whole image is free from vulnerabilities.
http://cwonline.computerworld.com/t/9325132/823929840/766925/53/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=cd466a16

9 reasons why users still struggle with online security


http://cwonline.computerworld.com/t/9325132/823929840/766926/54/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=77b0666c

INSIDER: Road warriors are prime targets for hackers

Here are some steps companies and executives can take to enhance travel-related
security. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9325132/823929840/766927/55/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=57e5bcd4

The dreaded risk assessment

A risk assessment, the process of identifying, ranking and deciding how to
mitigate organizational risks, is now a requirement in many of the major bodies
of regulations. Having to perform such an assessment can strike fear in even the
most confident manager. This process can be done, however, with minimal angst,
and can be of major benefit to organizations of any size. From the IDG
Contributor Network.
http://cwonline.computerworld.com/t/9325132/823929840/766928/56/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7f28a2cd

Mind your analytics, or you could soon be in ethical hot water

It's no secret that the implications of big data extend far beyond
organizational benefits into the societal and ethical realm, but market
researcher Gartner predicts that the improper use of big data analytics will
cause half of all business ethics violations by 2018.
http://cwonline.computerworld.com/t/9325132/823929840/766929/57/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6f0f98ac

Privacy watchdogs give EU, U.S. three months to negotiate new Safe Harbor deal

European data protection authorities have given the European Commission and
national governments three months to come up with an alternative to the Safe
Harbor agreement swept away recently by a ruling of the Court of Justice of the
European Union.
http://cwonline.computerworld.com/t/9325132/823929840/766930/58/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6352b040

To scare people better, Android ransomware gets a snazzy UI

Hackers are like any other coders: they want to built better software, even if
it's a program that merely aims to extract a ransom from a hapless Android user.
http://cwonline.computerworld.com/t/9325132/823929840/766931/59/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a6fb506c

INSIDER: IoT will become a matter of life or death for security pros

Internet of Things means different things to different people: Self-driving
cars, smart cities, connected homes, health and fitness apps, among others. But
for security professionals, IoT will become a safety issue.
http://cwonline.computerworld.com/t/9325132/823929840/766932/60/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e4905d02



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9325132/823929840/724679/61/


Computerworld's 2016 IT Salary Survey: How does your salary compare with your IT
peers? Computerworld's 30th Annual Salary Survey will feature the latest IT
salary trends and advice on where to find the best-paying jobs. This year's
survey participants can enter a drawing to win 1 of 3 American Express gift
cheques for $500 each! The drawing is open to legal U.S. residents, age 18 or
older. Take our annual IT Salary Survey today!
http://cwonline.computerworld.com/t/9325132/823929840/754544/62/

Read about the 6 traits of rising IT stars
Check out our October Digital Magazine, featuring a look at some of IT's rising
stars. What qualities put IT pros on the fast track to the top? These five
up-and-coming execs (and their bosses) offer advice on ways to hone your own
leadership skills. The magazine also includes News Analysis, Opinions and Shark
Tank -- all free for download with registration.
View the magazine at
http://cwonline.computerworld.com/t/9325132/823929840/763910/63/

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9325132/823929840/741285/64/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9325132/823929840/641183/65/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9325132/823929840/689330/66/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9325132/823929840/689330/67/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9325132/823929840/156832/68/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9325132/823929840/311619/69/

Facebook: http://cwonline.computerworld.com/t/9325132/823929840/311620/70/

Twitter: http://cwonline.computerworld.com/t/9325132/823929840/311621/130/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9325132/823929840/131135/131/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89OTMyNTEzMg%3d%3d&x=876146a3

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9325132/823929840/689329/132/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9325132/823929840/689329/133/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9325132/823929840/689331/134/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:43 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive