Friday, 25 March 2011

7 Communication Mistakes CSOs Still Make

  Security Will Rescue Cloud Computing | Facebook Quick Tip: Enable Encryption to Avoid New Privacy Glitch
 
  CIO Security

Forward this to a Friend >>>


7 Communication Mistakes CSOs Still Make
For many years, we heard security professionals lament the way they are perceived. Terms such as "the place where good ideas go to die" and "the department of no" weren't uncommon just a few years ago when referring to the security function. Read More


WHITE PAPER: SonicWALL

The Next Generation is the Smart Generation
Innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into the corporate network. This eBook investigates why traditional firewalls are no longer enough, and how application intelligence and control enable network security in the wake of these changes. Read more.

In this Issue


SURVEY: Global Security Survey

9th Annual Global Security Survey
CIO, CSO & PricewaterhouseCoopers are conducting our 9th annual survey of worldwide information security practices. Participate & receive a copy of the survey summary when completed, a valuable tool that can help measure security initiatives against peers & provide insight into the current state of information security practices & challenges. Complete our survey & enter a prize drawing for an Apple iPad.

Security Will Rescue Cloud Computing
Whenever the topic of security is mentioned in the context of cloud computing, it is usually discussed as the "big barrier" to adoption. The perceived or actual lack of security in the cloud makes it impossible for businesses to make the leap into this new computing paradigm. I propose a different perspective: Security will rescue cloud computing. Read More

Facebook Quick Tip: Enable Encryption to Avoid New Privacy Glitch
Some Facebook traffic this week took a misguided trip from AT&T servers through China and South Korea, exposing some user data. To protect yourself against such glitches, here's how to enable Facebook's HTTPS feature. Read More

AT&T Facebook Traffic Takes a Loop Through China
Traffic destined for Facebook from AT&T's servers took a strange loop though China and South Korea on Tuesday, according to a security researcher. Read More

Does RSA SecurID have a U.S Gov't-Authorized Back Door?
Does the RSA SecurID two-token authentication system include a back door that was built in at the request of the U.S. government in exchange for letting RSA export SecurID? Read More

RSA's SecurID Security Breach: What Should You Do?
RSA's disclosure last night that it has suffered a sophisticated cyberattack in which attackers obtained some type of information about RSA's SecurID product for two-factor authentication is prompting a variety of suggestions in how customers should deal with the problem. Read More

The RSA Hack FAQ
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation. Read More

Browser Security 'Critical' to Mobile Protection, Says Forrester
Security professionals should keep an eye on browser application technologies if they want to ensure that mobile devices used in the enterprise are secure, according to a Forrester analyst. Read More

BlackBerry Enterprise Server (BES) 5.0.3 Expected This Week: 9 Key Features
With BlackBerry administrators and corporate smartphone users in mind, CIO.com's Al Sacco breaks down the most valuable features in the soon to be released BlackBerry Enterprise Server (BES) 5.0 Service Pack 3. Read More


WEBCAST: Accenture

Key IT Decisions For the Enterprise
Hear Accenture's Agile Infrastructure and Cloud experts Steve Nunn and Jimmy Harris talk about the impact of computing, social media, IP convergence and the continued focus on sustainable cost reduction on IT and the enterprise. Learn More

HBGary's Hoglund Sheds Light on Anonymous
HBGary's chief technology officer describes his research on Anonymous and why the group is making the insider threat problem more dire. Read More

Anonymous Draws Congressional Attention; Battles Disgruntled Members
When Anonymous attacked HBGary Federal back in January, it set off a chain of events that has spawned widespread fascination, fear, anger and some paranoia among the security industry, government, law firms, Congress and even Anonymous itself. Read More

European Commission Hit By Serious Cyberattack
The European Commission has been hit by one of the most serious cyberattacks ever this week. Commission staff have been told to change their passwords and access to webmail and intranet from outside has been suspended. Read More

Frankenstein Crimeware Registry Comes Online
A new crimeware registry including more than 4,000 entries has been compiled for use by students of the EC Council, a private firm that performs ethical hacker training. Read More

Expert: Iran Might Be Stealing Passwords From Citizens to Tighten Censorship
Iran's apparent theft of valid SSL certificates may be an attempt to trap Iranians who use the Internet to duck the government's restrictions, a security expert says. Read More

Microsoft Windows Intune: Better Way to Manage PCs?
Microsoft just launched Windows Intune, a Web-based service to let IT manage chores including updates, service packs, inventory and security. Will Windows Intune, aimed at companies with 25 to 500 PCs, save money on management costs? Read More

McAfee to Buy Database Security Vendor Sentrigo
Intel's McAfee unit is the latest major security vendor to move to buy a maker of tools to protect databases. Read More

Fraudulent Certificates Issued for Major Websites
When going to Google, Microsoft, Yahoo and other sites, beware. Attackers have managed to get valid certificates made for each site. Read More

 
 
 

Hot Picks for the Week

  1. iPhone 4 Newbies: 10 Essential Tips and Tricks
  2. The Cloud CIO: A Tale of Two IT Futures
  3. LinkedIn Quick Tip: How to Discover the Hottest New Job Skills
  4. 30 Most Anticipated Tech Products of 2011
  5. Join CIO on Facebook! Images, Stories, RSS, Twitter and more!

 

 

Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as info55383.news@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2011 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **

 

No comments:

Post a Comment