Tuesday, 27 August 2013

Data Security Lagging at Midmarket Industrial Firms

10 Security Tips for Customer Support and Service | Hackers May Cash in When XP is Retired

CIO Security

Forward this to a Friend >>>


Data Security Lagging at Midmarket Industrial Firms
Executives at midsized industrial firms believe their data is at little or no risk, even though they hold valuable intellectual property and business process data sought by criminals, according to consulting firm McGladrey. Read More


WHITE PAPER: Webroot Software

Remote Users Expose Companies to Cybercrime
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. Learn More

RESOURCE COMPLIMENTS OF: Prolexic Technologies

Don't let your anti-DDoS devices turn to the dark side
Cyber attackers are using SYN reflection attacks to turn your automated anti-DDoS mitigation equipment to the dark side, creating backscatter that amplifies the attack and floods other victims with SYN-ACK requests. Learn how to fight back. Get DDoS defense best practices in this free white paper: An Analysis of SYN Reflection Attacks

10 Security Tips for Customer Support and Service
What every company hopes dearly to avoid is the customer facing security incidents especially those involving compromise of customer information. While the issues related to retail customer information usually get primetime coverage, there is also the significant issue of B2B interactions with our corporate customers and partners. Read More

Hackers May Cash in When XP is Retired
Hackers may bank their Windows XP zero-day exploits and cash them in after Microsoft stops patching the aged operating system next April. Read More

NSA Revelations Prompt Tech Industry to Call for Privacy Safeguards
Leading trade organizations representing tech firms call on White House to tighten privacy and transparency requirements associated with government's electronic surveillance programs. Read More

Report: NSA Broke Into UN Video Teleconferencing System
The agency reportedly cracked the system's encryption to snoop on internal UN communications Read More


WEBCAST: Verisign Inc.

The Expanding DDoS Attack Surface
In this webcast, hear two technology experts discuss a new approach to defending against these attacks that ensures operational effectiveness and scalable protection to ultimately drive availability of your critical web systems. Date: Thursday, August 22, 2013, 2:00 PM EDT Learn More

NSA Fear Raises Concerns Over DHS Facial Recognition Technology
The U.S. government's effort to develop video surveillance technology capable of spotting fugitives or suspected terrorists needs to be wrapped in a privacy framework that prevents the data-gathering blunders of the National Security Agency, civil rights advocates say. Read More

$6B DHS Cybersecurity Contract Sets Off Race to Supply Real-Time Monitoring to Feds
The Department of Homeland Security's $6 billion cybersecurity award last week to a slew of contractors and vendors sets in motion a contest among them to sell federal agencies on new network monitoring, vulnerability assessment and mitigation technologies. Read More

Mozilla Considers Rejecting Long-lived Digital Certificates Following Similar Decision By Google
Starting in early 2014 Google Chrome will block certificates issued after July 1, 2012, with a validity period of more than 60 months Read More

Tech Firms' Responses to Latest NSA Disclosures Cloud the Truth, Experts Say
The NSA paid millions to compensate companies' surveillance costs, new documents claim Read More

Mozilla 'Plug-n-Hack' Project Aims for Tighter Security Tool Integration
The project aims to solve hiccups in how security tools work with web browsers Read More


Hot Picks for the Week

1. 15 Best iPad Apps for Newbies

2. Sign up for InCITE, the weekly CITEworld newsletter on consumerization

3. 7 Most Important Tech Trends Of 2012

4. Holiday Tech Gadget Gift Guide

5. 10 Must-Know Samsung Galaxy Note II Tips and Tricks


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment