Thursday, February 7, 2013

US Federal Reserve admits to breached system

  US Federal Reserve admits to breached system | Like WiFi at work? Then don't work for the government
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Ovum: Big data collection colliding with privacy concerns
A recent push in the IT industry to collect and monetize big data is headed for a clash with privacy concerns from Internet users and potential regulation from some governments, according to tech analyst firm Ovum. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

WHITE PAPER: Riverbed

Realizing ROI with Application-Aware Network Performance
Major IT developments such as virtualization, cloud initiatives, and the explosion of content and big data pose significant challenges for WAN and LAN performance, reliability, and flexibility. Learn more.

US Federal Reserve admits to breached system
Malicious attackers gained entry to internal U.S. Federal Reserve System computers, illegally copying a database of banking executive contact information, the banking system has confirmed. Read More

Like WiFi at work? Then don't work for the government
Apparently, many federal office buildings lack WiFi. Do you even remember what that was like? Read More


WEBCAST: CDW Corporation

Office 365: Why the Time is Right for Cloud-based E-mail
Is it expensive to run and time-consuming to manage? If your answer is yes, maybe it's time to consider a new approach--a cloud-based solution. Dean Murray of CDW shares insights and expertise on Microsoft 365 and Exchange online, and how CDW can assist you in migrating to this new cloud-based e-mail system. Learn More.

Kaspersky launches all-in-one security tool for SMBs
Companies have to manage security across a wide range of issues and threats. Operating systems and applications have to be patched and updated. Active monitoring needs to be in place to identify and block malware threats. Data needs to be protected to prevent exposure or compromise. Mobile devices and the BYOD (bring your own device) trend represent a new frontier of concerns. Read More

How secure is VeriFace facial recognition software?
I use VeriFace to log onto my Lenovo laptop by default. It is quick and logs me in easily, but I have to wonder how secure it really is. Would some other brown haired, blue-eyed guy in his 30s fool the software on my laptop, for example? I'm a big fan of making things easier for myself, but I do need a modicum of security too. Read More

President can order preemptive cyberattacks if needed
Secret review shows executive office has broad power to act in cyber emergency. Read More

 

BOOK GIVEAWAY

February's books are here. Enter now for your chance to win! We've got 5 copies of each book to give to some lucky winners.

Ubuntu Unleashed 2013 Edition

Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript

MOST POPULAR STORIES

1. Why unlocking your phone without permission is illegal (and why you should care)

2. Meet Mageia, a rising Linux star

3. Mice that didn't make the cut

4. Why you should jailbreak your Apple TV - and how to do it

5. Downton Abbey as an 8-bit Nintendo video game

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.