Computerworld Security
April 24, 2009
___________________________________________________________
***************SPONSOR**************************************
Best practices for a Data Warehouse on Oracle Database 11g
Increasingly companies are recognizing the value of an enterprise data warehouse
(EDW). A true EDW provides a single 360-degree view of the business and a
powerful platform for a wide spectrum of business intelligence tasks. To ensure
the EDW will get the optimal performance you need to get three fundamental
things correct, the hardware configuration, the data model and the data loading
process. With these three corner stones correct you can seamlessly scale out
your EDW.
http://cwflyris.computerworld.com/t/4885247/283856143/185841/0/
************************************************************
In this issue:
1. Conficker hype may have harmed security efforts, FBI cyber chief says
2. Report: President Obama to get secure BlackBerry 8830
3. Windows bugs never really die
4. Worm solves Gmail's CAPTCHA, creates fake accounts
5. Getting a grip on key rotation
6. DNS plays role in Craigslist killer case
OTHER RESOURCES
_______________
The NetApp Storage Efficiency Guide
http://cwflyris.computerworld.com/t/4885247/283856143/178497/0/
Preventing Data Loss When Migrating to Microsoft 2007
http://cwflyris.computerworld.com/t/4885247/283856143/184875/0/
_______________
Conficker hype may have harmed security efforts, FBI cyber chief says
Shawn Henry, the FBI's cybersecurity chief, said that the focus on Conficker as
a security threat leading up to the worm's vaunted April 1 update may have
distracted Internet users from other dangerous threats.
http://cwflyris.computerworld.com/t/4885247/283856143/185842/0/
Report: President Obama to get secure BlackBerry 8830
President Barack Obama will soon receive a high-security BlackBerry 8830 that he
can use to stay in touch with the First Lady and top aides, the Washington Times
reported today.
http://cwflyris.computerworld.com/t/4885247/283856143/185843/0/
Windows bugs never really die
Hackers can successfully attack Windows PCs months or even years after Microsoft
fixes a flaw, a security expert said today, because there always remains a pool
of unpatched systems.
http://cwflyris.computerworld.com/t/4885247/283856143/185844/0/
***************SPONSOR**************************************
Become a Member of Computerworld's Inner Circle
Computerworld's Inner Circle is a research panel made up of IT professionals and
executives. Results of surveys provide insight into various technology topics
and top issues faced by the IT community. Participants receive the research
results free and may also be eligible in drawings for other exciting prizes.
To join Computerworld's Inner Circle please use the following link:
http://cwflyris.computerworld.com/t/4885247/283856143/169848/0/
************************************************************
Worm solves Gmail's CAPTCHA, creates fake accounts
A Vietnamese security company has detected what it believes is a new worm that
thwarts Google's security protections in order to register new dummy Gmail
accounts from which to send spam.
http://cwflyris.computerworld.com/t/4885247/283856143/185845/0/
Getting a grip on key rotation
One of the ways to turn a pleasant dinner conversation among CISOs and risk
managers into a philosophical battleground is to introduce the topic of key
rotation, which is defined as the process of decrypting data with an old key and
re-keying the data with a new one.
http://cwflyris.computerworld.com/t/4885247/283856143/185846/0/
DNS plays role in Craigslist killer case
Network technology may have played a critical role in law enforcement officials
catching the alleged Craigslist killer before he was able to strike again.
http://cwflyris.computerworld.com/t/4885247/283856143/185847/0/
***************SPONSOR**************************************
SaaS Secures in Uncertain Times
In a tight economy, IT managers are faced with more challenges than ever.
Budgets are shrinking, Web and email threats are increasing, and administrators
are tasked with providing more support with fewer people. As organizations
rethink how they manage critical functions like Web and email security, industry
experts are recommending the software-as-a-service (SaaS) model.
************************************************************
SHARK BAIT OF THE DAY
_____________________
People who should never have been hired in IT
We have a regular meeting. In this meeting is a person who was hired a few years
ago and clearly has no clue! One time a user brought in their laptop to be
backed up and reimaged, and the employee in question drags the user's shortcuts
(notice I said shortcuts!) form the desktop to the CD drive and burns them ...
http://cwflyris.computerworld.com/t/4885247/283856143/185738/0/
SEEKING THE VERY BEST IT LEADERS
________________________________
Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at
http://cwflyris.computerworld.com/t/4885247/283856143/183552/0/
(Send questions to premier100@computerworld.com.)
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwflyris.computerworld.com/t/4885247/283856143/156832/0/
COMPUTERWORLD ON TWITTER
________________________
Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/4885247/283856143/126780/0/
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com
ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4885247/283856143/72509/0/
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.
To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4885247/283856143/72510/0/
To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4885247/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00ODg1MjQ3&x=88246734
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4885247/283856143/72511/0/
Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701
No comments:
Post a Comment