Tuesday, April 22, 2014

Even the most secure cloud storage may not be so secure, study finds

  A simple cure for the cybersecurity skills shortage | Even the most secure cloud storage may not be so secure, study finds

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Hundreds of medical professionals targeted in multi-state tax scam
Medical professionals in ten states have become victims of identity theft, after someone used their personal information, including Social Security Number, to file fraudulent tax returns. Read More
 


  In this Issue


WHITE PAPER: CA Technologies
 
Simplifying Data Protection, Reducing Risk of Data Loss
This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection, availability and alignment with business goals, as well as cost. Learn more!

A simple cure for the cybersecurity skills shortage
An approach that has worked for centuries in all sorts of industries is just as applicable to the security field. Read More
 

Even the most secure cloud storage may not be so secure, study finds
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are. Read More
 

Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK. Read More
 

Big bucks going to universities to solve pressing cybersecurity issues
During a week in which everyone seemed to be searching for answers amid revelations of the Heartbleed bug, several universities and their partners announced new efforts to explore IT security advances. Read More
 

9 things you need to know before you store data in the cloud
  The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular. Read More
 


WHITE PAPER: Riverbed Technology

Accelerating the Delivery Microsoft Office 365
Many organizations use Office 365's cloud-based mail, collaboration and communication services as the dominant workload. However, as services move to the cloud, data centers are no longer local, and end-user experience can suffer. Learn more >>

Microsoft slashes Windows XP custom support prices just days before axing public patches
Just days before Microsoft retired Windows XP from public support, the company drastically reduced the price of custom support agreements that give large companies and government agencies another year of XP patches, experts reported today. Read More
 

Tor anonymity network to shrink as a result of Heartbleed flaw
  The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity. Read More
 

Why a smartphone 'kill switch' won't stop phone theft
Yesterday, wireless industry group CTIA announced a partnership between many of the major smartphone makers and all of the leading U.S. wireless carriers that's designed to enable smartphone "kill-switch" functionality on handsets sold in the United States after July 2015. Read More
 

With Heartbleed, IT leaders are missing the point
If our checks and balances are so fragile that a typo can obliterate all meaningful security, we have some fundamental things to fix. Read More
 

Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake antivirus to fake utilities to fake upgrades to the operating system and trojanized applications. NSS Labs tested several endpoint security products to see how well each would block these attacks. Read More
 

 

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

8 books every IT leader should read this year
 

A method to the madness: How 13 programming languages got their names

IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.