Tuesday, June 10, 2014

Real-world horror stories show why data security is so hard

Real-world horror stories show why data security is so hard | What data breaches teach us about the future of malware: Your own data could dupe you

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Gazzang buy gives end-to-end encryption for Cloudera Hadoop
Cloudera will incorporate technology from its acquisition of encryption software provider Gazzang into Apache Hadoop so that industries with stringent security regulations can use the big-data processing platform. Read More


WHITE PAPER: LifeLock

Combating Identity Theft in a Mobile, Social World
As mobile devices and social media become more deeply intertwined, identity thieves are finding new ways to target victims with disastrous efficiency. Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the company at large. Learn More

WEBCAST: CA Technologies

The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

Real-world horror stories show why data security is so hard
Corner-office executives, IT pros and other so-called knowledge workers are supposed to be pretty smart, right? Dare we say trustworthy. Unfortunately, they are the leakiest of vessels when it comes to protecting sensitive company information. Read More

What data breaches teach us about the future of malware: Your own data could dupe you
The most concerning security trend can't be remedied by patching and updating applications or thwarted by your security software. Read More

Snowden leaks after one year: Wrangling over the meaning of 'bulk'
A debate in the U.S. about whether the National Security Agency should end its bulk collection of U.S. telephone and business records has come down to an argument over the meaning of the word "bulk." Read More

Malicious advertisements on major websites lead to ransomware
Malicious advertisements on domains belonging to Disney, Facebook, The Guardian newspaper and others are leading people to malware that encrypts a computer's files until a ransom is paid, Cisco Systems has found. Read More


: CenturyLink Technology Solutions

Case Study: Big Data Culture Clash
The ability to create a data-driven culture is about to separate the winners from the losers in just about every industry. Creating a targeted, data-driven culture offers increased customer engagement, satisfaction and revenue. Learn the strategies you need to create and perpetuate a big data culture. Learn More

US Army warns of database breaches in South Korea
The U.S. Army warned Thursday that databases holding information on 16,000 South Korean civilian employees of the U.S. military and applicants for base jobs may have been compromised. Read More

Vodafone granted governments direct access to its networks for surveillance
Vodafone has granted governments direct access to its networks in several countries, allowing them to listen to all conversations on those networks, the company said Friday. Read More

Many servers expose insecure out-of-band management interfaces to the Internet
Many servers expose insecure management interfaces to the Internet through microcontrollers embedded into the motherboard that run independently of the main OS and provide monitoring and administration functions. Read More

New EU privacy laws will apply to non-European companies in the continent
EU justice ministers on Friday reached a partial agreement on planned new data privacy laws, but still disagree about how to implement them. Read More


SURVEY

Take ITworld's cloud survey and you could win $500
ITworld is conducting a brief survey regarding cloud computing initiatives, and we value your input. The survey will take you about 10 minutes to complete. And there's a reward! Respondents who complete the survey will be entered in a sweepstakes to win a $500 cash prize. Take the survey now!

GIVEAWAYS:

Enter today for your chance to win!

The Rails 4 Way
Through detailed code examples, you'll dive deep into the Rails 4 code base, discover why Rails is designed as it is, and learn how to make it do exactly what you want. Enter now!

JavaScript Essentials LiveLessons (Video Training)
In 4 hours of video instruction, JavaScript Essentials LiveLessons provides a solid foundation on which to build skills, from the perspective of a web developer. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.