Tuesday, October 8, 2013

Add technologists to surveillance tech review panel, IT groups say

Add technologists to surveillance tech review panel, IT groups say | EU ministers agree in principle to new data protection oversight

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: The Practice of Network Security Monitoring
Enter today for your chance to win! You'll learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools. Read More


RESOURCE COMPLIMENTS OF: Neustar

Hoping DDoS will go away? Wish you had a strategy?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: PC Connection

5 Steps for Building a Secure Cloud
The cloud promises impressive gains in infrastructure agility, efficiency, and cost reduction, but the greatest barrier to cloud adoption continues to be security. Read this white paper to learn best practices for keeping your data and your organization safe. Learn More

Add technologists to surveillance tech review panel, IT groups say
U.S. President Barack Obama should add actual technologists to a group reviewing the nation's surveillance technologies, IT-related groups have said. Read More

EU ministers agree in principle to new data protection oversight
Despite disagreements, Europe's justice ministers Monday agreed "in principle" that companies doing business in the European Union will have to answer only one data protection authority rather than 28. Read More

U.S. ranks fourth in Internet freedom as surveillance grows worldwide
Internet freedom has declined in the United States over the past year as a result of its surveillance policies, reflecting a trend that appears to have caught on worldwide, according to a recently released study. Read More


WEBCAST: IBM

Dispelling the Top 3 Myths for Utilizing Business Analytics
Many organizations are focusing on their Operations to reduce costs. Operations aligns processes to ensure customer expectations are met. In order to excel in Operations, organizations must go beyond what they've been doing with process improvement – and create and sustain smarter processes. Register Now

McAfee moves to redefine SIEM, enterprise security
Most security information event management systems can identify threats, but they can't remove them. McAfee's new Enterprise Security Manager takes that next step. Read More

Hosting provider LeaseWeb falls victim to DNS hijacking
Hosting provider LeaseWeb became the latest high-profile company to have its domain name taken over by attackers, highlighting that DNS (Domain Name System) hijacking is a significant threat, even to technically adept businesses. Read More

Adobe hack shows subscription software vendors lucrative targets
Hackers jack 3 million credit cards, many tied to Creative Cloud software-by-subscription service. Read More

How to prepare for the CISSP
The CISSP is a valuable certification, but it takes a lot more than just your many years of experience to prepare for it. You will likely have to learn about a lot of technology and processes that you've never worked with, some of it not especially current and all of it a lot less vendor-specific than you've ever imagined. Read More


SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.