Thursday, August 14, 2014

Cisco slashing up to 6,000 jobs

Snowden reveals automated NSA cyberwarfare program | Amazon protects its virtual desktops with two-factor authentication

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


7 futuristic authentication systems DARPA is funding
From analyzing the way you walk to your heartbeat, these password killers could be here soon. Read More


WEBCAST: VMware | IBM

3 Virtual Desktop Must-haves
Employees today expect to take their work anywhere and on any device. This BYOD mindset poses a dilemma for organizations that want to create a flexible workplace while ensuring security, control, and lower costs. IBM and VMware collaboratively provide a dynamic VDI solution. View Now

RESOURCE COMPLIMENTS OF: CSO Perspective

Save the Date: Boston-Area CSO Perspectives Conference 9/16
The Boston-area CSO Perspectives Conference is being held on Tuesday, September 16 at the Sheraton Framingham Hotel. At this one-day event, produced by CSO and focused on "Defending Against the Pervasive Attacker," you'll have the opportunity to connect with an extensive network of visionary CSOs, CIOs and business experts. Register now.

Snowden reveals automated NSA cyberwarfare program
The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden. Read More

Amazon protects its virtual desktops with two-factor authentication
Amazon Web Services now lets enterprises use two-factor authentication to better protect hosted WorkSpaces virtual desktops. Read More

Study finds firmware plagued by poor encryption and backdoors
The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the "Internet of Things." Read More

Testing service rolls out vast federated identity management system using Oracle
The Educational Testing Service says it has gained efficiencies by centralizing its identity and access management. Read More


WEBCAST: IBM Corporation

Desktop virtualization market trends
You've probably heard about desktop virtualization -- and some of its benefits – things like tighter security, streamlined management and lower costs. But would desktop virtualization be right for your company? Could you expect to reap all those benefits? And how quickly would you gain a return on investment? View Now

Malware is less concerned about virtual machines
Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research. Read More

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say
Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers. Read More

Fifteen new vulnerabilities reported during router hacking contest
Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors. Read More

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software
BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software. Read More


BOOK GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

The Official Ubuntu Book, 8th Ed.

Essential Mobile Interaction Design

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.