Computerworld Security: January 06, 2011
===============================================================

Researchers confirm Googler's Internet Explorer bug

French security researchers today confirmed the presence of a bug in Internet
Explorer (IE) that's at the center of a spat between Microsoft and a Google
security engineer.
http://cwonline.computerworld.com/t/7121808/114916/352186/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: MessageLabs~~~~~~~~~~~~~~~~~~~~~

Managing Your Wireless Workforce

True mobile security doesn’t stop at devices and software. It relies just as
much on the actions of end users. This means companies must instill a culture of
security within their organizations. This paper will provide advice, best
practices, and insight on how to create security and management policies for a
wireless workforce.

http://cwonline.computerworld.com/t/7121808/114916/352187/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 
IN THIS ISSUE

1. Microsoft, Googler tussle over bug timeline
http://cwonline.computerworld.com/t/7121808/114916/352188/0/

2. Alleged Miley Cyrus hacker arrested
http://cwonline.computerworld.com/t/7121808/114916/352189/0/

3. S. Korean police say Google collected private data illegally
http://cwonline.computerworld.com/t/7121808/114916/352190/0/

4. Darlene Storm: Tightening security to CIA paranoid mentality in 
post-WikiLeaks era
http://cwonline.computerworld.com/t/7121808/114916/352191/0/

5. Recalculating the telephony security equation
http://cwonline.computerworld.com/t/7121808/114916/352192/0/

6. Implications of next-decade computing
http://cwonline.computerworld.com/t/7121808/114916/352193/0/

 
~~~~~~~~~~~~~~~~~~~WHITE PAPER: F5 Networks~~~~~~~~~~~~~~~~~~~~~

Securing the Cloud

Cloud computing has become another key resource for IT deployments, but there is
still fear of securing applications and data in the cloud. With F5 devices, you
can keep your most precious assets safe, no matter where they live.

http://cwonline.computerworld.com/t/7121808/114916/352194/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
Microsoft, Googler tussle over bug timeline

Microsoft and a Google security engineer are sparring over a bug the researcher
reported to Microsoft last July.
http://cwonline.computerworld.com/t/7121808/114916/352188/0/
 
Alleged Miley Cyrus hacker arrested

The 21-year-old hacker who boasted about breaking into Miley Cyrus' Gmail
account and posting racy photographs of the teenage star has been arrested in
Tennessee on fraud charges.
http://cwonline.computerworld.com/t/7121808/114916/352189/0/
 
S. Korean police say Google collected private data illegally

South Korea has concluded that Google illegally collected personal data while
collecting information for its Street View map service, an official at the
country's National Police Agency (NPA) said.
http://cwonline.computerworld.com/t/7121808/114916/352190/0/
 
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Iron Mountain~~~~~~~~~~~~~~~~~~~~~

Compare PC Online Backup and Recovery Service Providers

Online backup and recovery service providers have emerged from different market
spaces and have different product focuses and business drivers. These providers
can be grouped into three categories. This white paper helps IT professionals
distinguish between these categories of service providers.

http://cwonline.computerworld.com/t/7121808/114916/352195/0/?3e076d18=YXJjaGl2ZUBtYWlsLWFyY2hpdmUuY29t&x=cde76b4d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
Darlene Storm: Tightening security to CIA paranoid mentality in post-WikiLeaks 
era

The Obama Administration has ordered drastic changes to plug security leaks.
Grumpiness or a contact in the media may indicate you are an insider threat.
Agencies are asked about monitoring former employees - as in capturing evidence
of visits to WikiLeaks. Some believe the CIA mentality approach is paranoia, not
security.
 
http://cwonline.computerworld.com/t/7121808/114916/352191/0/
 
Recalculating the telephony security equation

Among the threats that keep IT security managers up at night, attacks against
phone systems have often ranked near the bottom. The last time we asked IT
leaders about their telephony security plans, just 2% had experienced a security
incident, and in almost all of these cases, the attack was internal misuse of
phone systems for personal long-distance calls. Few had developed any sort of
comprehensive security or risk analysis plan covering their voice systems.
http://cwonline.computerworld.com/t/7121808/114916/352192/0/
 
Implications of next-decade computing

In wrapping up our look at what the next decade's converged computing and
communications capabilities will look like, there are some fundamental issues
that were important (in a different form) 10 years ago that will continue to
need to be addressed.
http://cwonline.computerworld.com/t/7121808/114916/352193/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
BEST PLACES IN IT: DO YOU LOVE YOUR JOB?

Computerworld is collecting nominations for the Best Places to Work in IT.  If
your IT department offers great benefits, competitive salaries, opportunities
for training and advancement and access to interesting projects -- then get your
organization recognized! Our special report, to be published in the June 20
edition of Computerworld, will spotlight the top 100 organizations that offer
their IT staffs challenging and satisfying work environments.

Nominate your company or another deserving company:
http://cwonline.computerworld.com/t/7121808/114916/340171/0/
 
CAST YOUR VOTE IN OUR QUICKPOLL 

Cast your vote in our latest QuickPoll: What will be the biggest announcement
from CES 2011?

http://cwonline.computerworld.com/t/7121808/114916/351095/0/
 
SHARK TANK OF THE DAY
______________________

What's the hurry?

Flashback to the 1970s, when this pilot fish's first job in IT is operating the
machine that reads stacks of punched cards containing programs and data -- and
every now and then, he has something to apologize for.

http://cwonline.computerworld.com/t/7121808/114916/352083/0/
 
NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7121808/114916/156832/0/


Get more IT peer perspective online: 

LinkedIn Group: http://cwonline.computerworld.com/t/7121808/114916/311619/0/

Facebook: http://cwonline.computerworld.com/t/7121808/114916/311620/0/

Twitter: http://cwonline.computerworld.com/t/7121808/114916/311621/0/ 

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: 
arch...@mail-archive.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7121808/114916/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MTE0OTE2LmQwMjdhOTc3ZDZmMmEyYzkwZjlkN2ZmNDllMWFlMjg4Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03MTIxODA4&x=8166ecbe

To manage your subscription preferences, go to: 
http://cwonline.computerworld.com/t/7121808/114916/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7121808/114916/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7121808/114916/72509/0/

If you are interested in advertising in this newsletter, please contact: 
bgl...@cxo.com

To contact Computerworld, please send an e-mail to onl...@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone 
directly, 
send an e-mail to onl...@computerworld.com **


Reply via email to