Thursday, September 5, 2013

Amazon hiring 'top secret' IT staff as it fights for CIA work

Amazon hiring 'top secret' IT staff as it fights for CIA work | Two sentenced to prison for point-of-sale credit card theft

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


AVG's 2014 lineup of antivirus and security includes new Web privacy protections
On Wednesday, AVG released the 2014 versions of its antivirus and Internet security programs. Available for immediate download, the programs range from the no-cost AVG AntiVirus FREE 2014 to higher-end paid software such as AVG Premium Security 2014 and AVG PC TuneUp 2014. Read More


WHITE PAPER: Couchbase

3 Trends Disrupting the Status Quo of Databases
Large numbers of users combined with the dynamic nature of usage patterns is driving the need for more scalable database technology. Learn why NoSQL is increasingly regarded as a viable alternative to relational databases and should be considered particularly for interactive web and mobile applications. Read more!

WHITE PAPER: Dell

Active Directory Recovery: Be More Prepared
Active Directory's Recycle Bin won't restore improperly changed attributes, nor recover external objects. To ensure AD integrity, you'll need to plan for multiple scenarios and include broader recovery capabilities. Read the White Paper >> Read now!

Amazon hiring 'top secret' IT staff as it fights for CIA work
Government private cloud bid represents new approach for Amazon -- one that has put it at odds with IBM. Read More

Two sentenced to prison for point-of-sale credit card theft
Two Romanian men were sentenced Wednesday to serve prison sentences for remotely hacking into hundreds of U.S. merchants' computers and stealing payment card data, the U.S. Department of Justice said. Read More

Lookout security for Samsung Knox smartphones
Samsung Knox smartphones will include mobile security software from Lookout to protect business users from mobile threats, the San Francisco company said Tuesday. Read More


WHITE PAPER: HP

Rethinking Your Enterprise Security
Forward-thinking enterprises realize they need to focus on a sustainable approach to security and risk management—one that is designed to address the new wave of vulnerabilities that prevail due to increasing trends in IT consumerization, mobility, social media, cloud computing, cyber crime, and nation-state attacks. View Now

Researcher claims $12,500 reward for finding Facebook photo bug
A security researcher said Facebook will award him US$12,500 for finding a flaw that lets anyone remove photos from another person's profile. Read More

NSA-resistant Android application 'burns' sensitive messages
Silent Circle, a company specializing in encrypted communications, released a messaging application for Android devices on Wednesday that encrypts and securely erases messages and files. Read More

Best tools for protecting passwords
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login. Read More

What to look for when evaluating password manager software
Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers. Read More


SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

DON'T MISS...

Famous firsts: The earliest days of your favorite social networks

Jealous much? 8 techy things that can spark office envy

Hey Gen Y'er, want a promotion? Communicate like an old guy

10 overhyped tech products that crashed and burned

Up all night: How the tech elite pushes a crazy workaholic culture


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.