Friday, 19 July 2013

BYOD Runs Wild at Most Global Companies

  National Data Breach Notifications Would Replace 'Patchwork' of State Statutes | Why Help Desk Employees are a Social Engineer's Favorite Target
 
 
  CIO Security

Forward this to a Friend >>>


BYOD Runs Wild at Most Global Companies
  More and more workers around the world are bringing their personal mobile devices to the office daily, and companies appear to be having trouble keeping up with the trend. Read More
 


RESOURCE COMPLIMENTS OF: Prolexic Technologies
 
  Average Packet-Per-Second Volume Increases 925% over Q2 2012
  As the world's leading DDoS mitigation provider, Prolexic is ideally positioned to collect valuable data on the origins, tactics, types, and targets of these attacks and identify emerging trends. Through data forensics and post attack analysis, Prolexic is able to build a global view of DDoS attacks. Download the full DDoS attack report >>>

WHITE PAPER: Dell Software
 
  Building Business Trust with App. Performance Monitoring
  This EMA report highlights key steps CIOs can take to ensure business relevance in the age of disruptive technologies. Taking into account the complexities surrounding application delivery, EMA sees leading-edge management solutions as a key to harnessing disruption to deliver business value. Read Now!

National Data Breach Notifications Would Replace 'Patchwork' of State Statutes
  Technology trade group executives make the case for a single, nationwide standard for notifying customers in the event of a breach. Read More
 

Why Help Desk Employees are a Social Engineer's Favorite Target
  Help desk staffers are too helpful; and that makes them a perfect target for a social engineering criminal. Read More
 

California Attorney General Releases Breach Report
  In the first report of its kind, California's Attorney General, Kamala D. Harris, had revealed that 2.5 million people -- roughly 6.5 percent of the state's population -- were exposed by data breaches in 2012. Read More
 

With Universities Under Attack, Security Experts Talk Best Defenses
  Like U.S. corporations, universities are battling a growing number of cyberattacks, believed to be mostly from China. Read More
 


WHITE PAPER: OpenMarket
 
  Leveraging Cross Channel Mobile Engagement
  As enterprises recognize the need for a mobile strategy, it can be difficult to capitalize on the opportunities. This paper explains why enterprises should embrace mobile engagement, and describes how OpenMarket's platform helps solve customer, partner and employee communication challenges. Learn More

New Vulnerability Found in Java 7 Opens Door to 10-year-old Attack, Researchers Say
  The vulnerability allows attackers to bypass the Java security sandbox, researchers from Security Explorations said Read More
 

Microsoft Denies Giving Government Open Access to Customer Data
  Read More
 

Microsoft to Feds: Let Us Explain our Dealings with the NSA
  Frustrated by laws that prevent it from talking about how and when it turns over customer information to the federal government Microsoft is asking Attorney General Eric Holder to clear the way to publicly share more details about that process. Read More
 

FBI Ransomware Spotted on Mac OS X
  The so-called "FBI Ransomware" that has targeted Microsoft Windows users for years is now striking Mac OS X computers, security researchers warn, but add that the Mac version of the malware is technically different and much easier to remove. Read More
 

Apple, Microsoft to Leap on App Auto-Update Bandwagon
  By this fall, Apple and Microsoft will have followed in the footsteps of Google to automatically update apps on their mobile and desktop platforms, another step in the trend to take security out of users' hands. Read More
 

 
 

Hot Picks for the Week

1. 15 Best iPad Apps for Newbies

2. Sign up for InCITE, the weekly CITEworld newsletter on consumerization

3. 7 Most Important Tech Trends Of 2012

4. Holiday Tech Gadget Gift Guide

5. 10 Must-Know Samsung Galaxy Note II Tips and Tricks


 
 

Get more CIO peer perspective online
  LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
 
  If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **

 


 

No comments:

Post a Comment