Computerworld Security: Issues and Trends: December 02, 2015
===============================================================
Judge applies common sense to question of what constitutes a data breach
A breach that doesn't result in anyone compromising any data is something like
the proverbial tree that falls in the forest with no one around. Is it truly a
data breach?
http://cwonline.computerworld.com/t/9381702/823929840/776485/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=50a7b376
~~~~~~~~~~~~~~~~~~~WEBCAST: Sophos Inc~~~~~~~~~~~~~~~~~~~~~
Hackers Communicate; Your Security Technologies Should Too
It's time to close the gap left open by layered, standalone security tools and
share contextual information. Using numerous point products that work in a
vacuum no longer provides adequate defense.
http://cwonline.computerworld.com/t/9381702/823929840/776486/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=06c1f062
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Toy maker VTech says breach hit 6.4 million kids' accounts
http://cwonline.computerworld.com/t/9381702/823929840/776487/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a7543765
2. INSIDER: Why phishing attacks are nastier than ever
http://cwonline.computerworld.com/t/9381702/823929840/776488/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=de8cfb3e
3. IDG Contributor Network: Healthcare security and HIPAA: Why compliance and security are still lacking
http://cwonline.computerworld.com/t/9381702/823929840/776489/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=91ebdcd8
4. What you need to know about Dell's root certificate security debacle
http://cwonline.computerworld.com/t/9381702/823929840/776490/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=35bcdaba
5. Congress targets cybersecurity; you're the victim
http://cwonline.computerworld.com/t/9381702/823929840/776491/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=60b41071
~~~~~~~~~~~~~~~~~~~WEBCAST: Level 3 Communications~~~~~~~~~~~~~~~~~~~~~
The Threats Never Stops
In this information driven economy, security risks are evolving. Find out what a
network-based security solution can do to limit your exposure.
http://cwonline.computerworld.com/t/9381702/823929840/776492/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d7bc94a9
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Toy maker VTech says breach hit 6.4 million kids' accounts
Educational toy maker VTech said that 11.6 million accounts were affected by a
mid-November cyberattack, including those of 6.4 million children.
http://cwonline.computerworld.com/t/9381702/823929840/776487/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=41e1b189
INSIDER: Why phishing attacks are nastier than ever
Forget Nigerian princes -- today's spearphishing is sophisticated business,
fooling even the most seasoned security pros.
http://cwonline.computerworld.com/t/9381702/823929840/776488/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=477aa5a5
~~~~~~~~~~~~~~~~~~~: Ping Identity Corporation~~~~~~~~~~~~~~~~~~~~~
Identity-Defined Security
Managing identities across partners redefines the security perimeter. Ping
Identity founder Andre Durand recently discussed the company's vision of
identity-defined
security to secure all users, devices, networks and applications. Read his Q&A
here.
http://cwonline.computerworld.com/t/9381702/823929840/776493/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c6226698
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IDG Contributor Network: Healthcare security and HIPAA: Why compliance and security are still lacking
A number of healthcare data breaches have made the news of late, particularly
involving large insurance companies and data clearinghouses. Often overlooked in
press reports are the smaller practices, which are, from my experience, seldom
fully HIPAA compliant. This article will discuss the reason compliance is
lacking, and outline how to get started.
http://cwonline.computerworld.com/t/9381702/823929840/776489/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=045df9e2
What you need to know about Dell's root certificate security debacle
In an attempt to provide a more streamlined remote support experience, Dell
installed a self-signed root certificate and corresponding private key on its
customers' computers, exposing users' encrypted communications to potential
spying.
http://cwonline.computerworld.com/t/9381702/823929840/776490/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=48ec139d
Congress targets cybersecurity; you're the victim
The Cyber Intelligence Sharing Act is a significant privacy invader that will do
nothing to keep us safer.
http://cwonline.computerworld.com/t/9381702/823929840/776491/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f4f75490
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Is your IT department a great place to work?
Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 23rd annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 21, 2015:
http://cwonline.computerworld.com/t/9381702/823929840/774082/37/
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9381702/823929840/724679/38/
Read about the 6 traits of rising IT stars
Check out our October Digital Magazine, featuring a look at some of IT's rising
stars. What qualities put IT pros on the fast track to the top? These five
up-and-coming execs (and their bosses) offer advice on ways to hone your own
leadership skills. The magazine also includes News Analysis, Opinions and Shark
Tank -- all free for download with registration.
View the magazine at
http://cwonline.computerworld.com/t/9381702/823929840/763910/39/
Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9381702/823929840/741285/40/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9381702/823929840/641183/41/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9381702/823929840/689330/42/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9381702/823929840/689330/43/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9381702/823929840/156832/44/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9381702/823929840/311619/45/
Facebook: http://cwonline.computerworld.com/t/9381702/823929840/311620/46/
Twitter: http://cwonline.computerworld.com/t/9381702/823929840/311621/47/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9381702/823929840/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89OTM4MTcwMg%3d%3d&x=93a18519
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9381702/823929840/689329/49/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9381702/823929840/689329/50/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9381702/823929840/689331/51/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, December 2, 2015
Judge applies common sense to question of what constitutes a data breach
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 9:49 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment