 | Hundreds of medical professionals targeted in multi-state tax scam Medical professionals in ten states have become victims of identity theft, after someone used their personal information, including Social Security Number, to file fraudulent tax returns. Read More In this Issue WHITE PAPER: CA Technologies Simplifying Data Protection, Reducing Risk of Data Loss This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection, availability and alignment with business goals, as well as cost. Learn more! A simple cure for the cybersecurity skills shortage An approach that has worked for centuries in all sorts of industries is just as applicable to the security field. Read More Even the most secure cloud storage may not be so secure, study finds Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are. Read More Hackers try to blackmail plastic surgeon after stealing 500,000 patient records Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK. Read More Big bucks going to universities to solve pressing cybersecurity issues During a week in which everyone seemed to be searching for answers amid revelations of the Heartbleed bug, several universities and their partners announced new efforts to explore IT security advances. Read More 9 things you need to know before you store data in the cloud The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular. Read More WHITE PAPER: Riverbed Technology
Accelerating the Delivery Microsoft Office 365 Many organizations use Office 365's cloud-based mail, collaboration and communication services as the dominant workload. However, as services move to the cloud, data centers are no longer local, and end-user experience can suffer. Learn more >> Microsoft slashes Windows XP custom support prices just days before axing public patches Just days before Microsoft retired Windows XP from public support, the company drastically reduced the price of custom support agreements that give large companies and government agencies another year of XP patches, experts reported today. Read More Tor anonymity network to shrink as a result of Heartbleed flaw The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. Read More Why a smartphone 'kill switch' won't stop phone theft Yesterday, wireless industry group CTIA announced a partnership between many of the major smartphone makers and all of the leading U.S. wireless carriers that's designed to enable smartphone "kill-switch" functionality on handsets sold in the United States after July 2015. Read More With Heartbleed, IT leaders are missing the point If our checks and balances are so fragile that a typo can obliterate all meaningful security, we have some fundamental things to fix. Read More Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake antivirus to fake utilities to fake upgrades to the operating system and trojanized applications. NSS Labs tested several endpoint security products to see how well each would block these attacks. Read More |  |
| | BOOK GIVEAWAY: We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!
Quality Code: Software Testing Principles, Practices, and Patterns Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.
Java SE8 for Programmers, 3rd Edition Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications. DON'T MISS... 16 terrible computer pranks that could get you fired Your new PC needs these 22 free programs 8 books every IT leader should read this year A method to the madness: How 13 programming languages got their names IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects |
| | Get more peer perspective online Google+ | LinkedIn | Facebook | Twitter You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com To contact ITworld, please send an e-mail to online@itworld.com. Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701. ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com. | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.