Tuesday, 16 July 2013

An IT Bucket Brigade Relives Hurricane Sandy

Unusual File-infecting Malware Steals FTP Credentials, Researchers Say | Report: Microsoft Helped NSA Circumvent its Own Encryption

CIO Security

Forward this to a Friend >>>


INSIDER
An IT Bucket Brigade Relives Hurricane Sandy
A new film recounts how a data center's customers and employees worked tirelessly to keep the facility running after last fall's big storm. Read More


WEBCAST: Xerox

SMB Security Guide
Amidst evolving cybersecurity threats, SMBs must be armed for the worst in order to drive innovation in today's decentralized, mobile workforce. Join this live webcast Tuesday, April 16, 2013, 11:00 AM EDT as we explore everything from threats and vulnerabilities to new security models and risk management best practices. Learn more.

WHITE PAPER: KeyedIn Solutions

Navigating the Project Management Minefield
This white paper outlines the project pitfalls that cost companies invaluable time and money, and covers the project management roles that can be synergized to turn projects from an organizational drain to a competitive advantage. Learn More.

Unusual File-infecting Malware Steals FTP Credentials, Researchers Say
About 70 percent of computers infected with this threat are in the US, according to antivirus firm Trend Micro Read More

Report: Microsoft Helped NSA Circumvent its Own Encryption
Microsoft says it does not give the NSA blanket access to its users' communications Read More

Ad Networks Agree to Take Steps Against Online Piracy
A group of U.S. companies operating Internet advertising networks has pledged to bar websites trafficking in pirated goods from using their services and to take other steps to fight online copyright infringement. Read More


WEBCAST: SAP

Predictive Analytics: The Stakes have Never Been Higher
In this webinar, learn how predictive analytics from SAP can help your organization turn data into insights, and insights into foresight. Also, hear Lubrizol Corporation explain why predictive analytics is more relevant than ever, and how it's getting their business from "what happened" to "what will happen?" View Now

The Ban on Feds at Defcon Draws a Mixed Reaction
Call for U.S. government workers to avoid security conference rankles some cyber warriors, gets cheers from others. Read More

Dropbox, Wordpress Used in Cyberespionage Campaign
The attackers did not exploit any vulnerabilities, but they opened up accounts and used the services as their infrastructure. Read More

Mobile Malware, Mainly Aimed at Android Devices, Jumps 614% in a Year
The threat to corporate data continues to grow as Android devices come under attack. Read More

Snowden Says U.S. is Using 'Historically Disproportionate Aggression' to Nab Him
Fugitive classified document leaker Edward Snowden, holed up at Moscow's Sheremetyevo International Airport since June 23, today accused the U.S. government of using "historically disproportionate aggression" to get him back to the United States to face charges of violating the Espionage Act of 1917. Read More


Hot Picks for the Week

1. 15 Best iPad Apps for Newbies

2. Sign up for InCITE, the weekly CITEworld newsletter on consumerization

3. 7 Most Important Tech Trends Of 2012

4. Holiday Tech Gadget Gift Guide

5. 10 Must-Know Samsung Galaxy Note II Tips and Tricks


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment