Thursday, April 25, 2013

10 surreal moments in infosec history

  Recently patched Java flaw already targeted in mass attacks, researchers say | AP Twitter hack prompts fresh look at cybersecurity needs
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


10 surreal moments in infosec history
A look at moments in infosec history that left us dumbfounded. Read More


WHITE PAPER: PC Connection, Inc.

Why Ultrabook™ Convertible Devices for the Enterprise
User expectations place new demands on IT. Often users prefer the mobility of a tablet, but need the processing power of an actual computer. Read the white paper, "Why Ultrabook Convertible Devices for the Enterprise," to learn about the real-world benefits of Intel® Ultrabook™ convertibles. Learn more.

WHITE PAPER: HP

Rethinking Your Enterprise Security
Forward-thinking enterprises realize they need to focus on a sustainable approach to security and risk management—one that is designed to address the new wave of vulnerabilities that prevail due to increasing trends in IT consumerization, mobility, social media, cloud computing, cyber crime, and nation-state attacks. Learn more.

Recently patched Java flaw already targeted in mass attacks, researchers say
Researchers advise users to upgrade to Java 7 Update 21 as soon as possible if they haven't already. Read More

AP Twitter hack prompts fresh look at cybersecurity needs
Two-step identity verification and analysis of user trends could prevent future attacks, experts say. Read More

CIO at hospital caring for Boston Marathon bombing victims and suspect shares lessons learned
Dr. John Halamka, CIO at the hospital where Boston Marathon bombing patients and suspects have been treated over the past week, shares lessons learned from an IT and security management perspective. Read More

Cisco edges F5 in VPN shootout
We tested five products that deliver remote SSL/VPN connectivity. Here's how they stack up. Read More


WEBCAST: Lexmark International

Are You Getting the Most Out of Managed Print Services?
Learn from IDC's Angele Boyd and Lexmark's John Crandall on how to achieve the maximum benefits from MPS. Learn More

One in five data breaches are the result of cyberespionage, Verizon says
Verizon's data breach investigations report covering 2012 includes information on cyberespionage-related breaches for the first time. Read More

FireEye finds Gh0stRAT cyberespionage campaigns continue
Many advanced persistent threat attacks use the malware, believed to have been developed in China. Read More

BYOD lawsuits loom as work gets personal
Your company better make sure it has an explicit terms-of-use BYOD agreement. Here are ways companies can protect themselves. Read More

BOOK GIVEAWAY: Win a copy of 'Google Drive & Docs In 30 Minutes'
We've got 5 copies to give to some lucky readers. Enter now for your chance to win! Read More

 

BOOK GIVEAWAY

April is coming to a close. Enter the book drawings today!

The Java Tutorial: A Short Course on the Basics, 5th Edition

Google Drive & Docs In 30 Minutes

DON'T MISS...

Ahead of their time: 9 technologies that came too soon

Your technology skills have a two year half-life and 6 ways to stay current

10 essential geek skills

LinkedIn makeover for developers

20 historic tech sounds you may have forgotten

BOOK GIVEAWAY

 

April's books are here. Enter today for your chance to win!

The Java Tutorial: A Short Course on the Basics, 5th Edition

Google Drive & Docs In 30 Minutes

 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.