Tuesday, November 4, 2014

Adobe's e-reader software collects less data now, EFF says

Adobe's e-reader software collects less data now, EFF says | Facebook gives away homebrewed OS monitoring tool

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


How to figure out if a data breach is a hoax
Deloitte has published ways to figure out if an organization has really been breached. Read More


WEBCAST: Dell Inc.

The Human Side of IT Security
The importance of IT security has vastly increased with the expansion in mobility, cloud computing, and social networking. Securing the organization is difficult enough, but it is considerably more difficult because of a number of factors tied to people. Learn more

In this Issue


WEBCAST: Sourcefire, now part of Cisco

Threat Intelligence In Incident Response/Management
In this webinar, hear from two experts on how you can empower your security team to quickly recover from and proactively defend against attacks while increasing the value of your existing security investment. Learn more >>

Adobe's e-reader software collects less data now, EFF says
Digital Editions 4.0.1 doesn't send data on e-books without DRM and uses encryption Read More

Facebook gives away homebrewed OS monitoring tool
Osquery watches for operating system state changes that might indicate a security issue. Read More

Keeping your data and email secure— no matter the industry
Don't think email security is important? Here are six everyday scenarios where many businesses loosely send sensitive and confidential content and files over unsecure email. Read More

INSIDER
USB is now UEC (use with extreme caution)
USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown. Read More

6 ways to stop criminal attackers in their tracks
Criminals always seem to be two steps ahead. Here are some methods to close that gap. Read More

Advisory says to assume all Drupal 7 websites are compromised
Only those who patched within seven hours may be in the clear. Read More


: WhiteHat Security, Inc.

Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

Vulnerabilities found in more command-line tools, wget and tnftp get patches
Flaws identified in wget and tnftp allow malicious servers to execute rogue commands on users' systems. Read More

Hurricane fails to stir Bacardi's business continuity plan
Bacardi was ready for Gonzalo when it hit. Read More

IT pros turn a blind eye to file sharing practices, report says
A recent report from Ponemon Institute shines light on the lack of oversight IT security leaders have over the file sharing practices within their own company. Based on a survey sponsored by Intralinks and administered to 1,100 IT professionals across three countries, half of these IT leaders admitted they engaged in fundamentally poor behavior, and have failed to set up corporate policies or assign accountability for data loss. These actions opened businesses to data loss, breaches and regulatory non-compliance punishments.[What's wrong with this picture? The NEW clean desk test] "The use of commercial-grade file sharing applications is putting sensitive and confidential company information at great risk. To address the threat, companies need to put in place policies and procedures for the appropriate use of these applications. Management often turns a blind eye to the risks because these applications often make employees more productive. However, they achieve greater productivity at the expense of a potential data breach," said Larry Ponemon, Chairman & Founder, Ponemon Institute.To read this article in full or to leave a comment, please click here Read More

Swedish hacker finds 'serious' vulnerability in OS X Yosemite
A white-hat hacker from Sweden says he's found a serious security hole in Apple's Yosemite OS X that could allow an attacker to take control of your computer. Read More

Microsoft endorses workaround for botched Windows patch KB 3000061
Two weeks after users offered a fix for the MS 14-058/KB 3000061 kernel mode driver installation problem, Microsoft confirms it works. Read More

Microsoft releases stopgap POODLE protection for Internet Explorer
Next Patch Tuesday is Nov. 11, but a Fixit tool disables SSL 3.0 in the meantime. Read More

How the Internet of Things is transforming law enforcement
From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field. Read More


NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!

Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

SALARY SURVEY

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.