Wednesday, April 29, 2009

New cybersecurity bill for electric grid readied

___________________________________________________________
Computerworld Security
April 29, 2009
___________________________________________________________

***************SPONSOR**************************************

A Practical Guide to Building an Effective Patch Management Process
Worms, viruses and hackers are a constant threat to IT systems, and maintaining
timely patching practices is the best defense. This white paper surveys today's
best practices for implementing a sound patch management strategy and process.

http://cwflyris.computerworld.com/t/4914665/283856143/186132/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=0058d540

************************************************************

In this issue:

1. New cybersecurity bill for electric grid readied

2. New zero-day exploit targets Adobe Reader

3. Senator questions wisdom of White House control over cybersecurity

4. Identifying the source of corporate threats

5. Lose your data, lose your business

6. Scott McPherson: Can the "cloud" help us manage our way through a pandemic?

7. Douglas Schweitzer: Try not to panic is easier said than done

8. Mark Everett Hall: Panda pushes new free hybrid security service for PCs

9. Where PCI DSS Still Falls Short and How to Improve It

10. Scott McPherson: New IT flu pandemic presentation, checklist available.

OTHER RESOURCES
_______________

Preventing Data Loss When Migrating to Microsoft 2007
http://cwflyris.computerworld.com/t/4914665/283856143/184875/0/

_______________

New cybersecurity bill for electric grid readied

Amid growing concern over the vulnerability of the U.S. electric grid to
cyberattacks, two lawmakers are preparing to introduce new legislation aimed at
bolstering the industry's responsiveness to such threats.
http://cwflyris.computerworld.com/t/4914665/283856143/186847/0/



New zero-day exploit targets Adobe Reader

Adobe Systems is investigating reports that its popular PDF viewing software,
Adobe Reader, contains a critical vulnerability.
http://cwflyris.computerworld.com/t/4914665/283856143/186848/0/

Senator questions wisdom of White House control over cybersecurity

Sen. Susan Collins (R-Maine) today questioned the need for a direct White House
role in coordinating national cybersecurity affairs.
http://cwflyris.computerworld.com/t/4914665/283856143/186849/0/

Identifying the source of corporate threats

The Verizon Business RISK team recently released its "2009 Data Breach
Investigations Report," which gives a fresh look into the question of whether
insiders or outsiders are the larger threat group. The report concludes that 74%
of breaches result from external sources and "the predominance of total records
lost was attributed to outsiders."
http://cwflyris.computerworld.com/t/4914665/283856143/186850/0/

Lose your data, lose your business

Disasters, by definition, strike with little or no warning. Whether it's an
extended power outage, a devastating storm, or some other unforeseen disruption,
the most nerve-wracking part of owning a business is the unknown. But good news:
we can prepare effectively to weather even the worst of storms. A solid
disaster-recovery (DR) plan can mean the difference between a business bouncing
back from a catastrophe or closing for good.
http://cwflyris.computerworld.com/t/4914665/283856143/186851/0/

***************SPONSOR**************************************

Managing Spend on Information Security and Audit for Better Results
The benchmarks conducted by the IT Policy Compliance Group show almost all
organizations have financial incentives exceeding 100 percent to make
improvements to reduce financial risk from data loss, downtime and regulatory
audit. This report includes findings covering the principal operational
outcomes being experienced by organizations, financial risks, losses and
returns, and the practices making the most difference to control risks, reduce
costs, and improve results.

http://cwflyris.computerworld.com/t/4914665/283856143/186019/0/

************************************************************


Scott McPherson: Can the "cloud" help us manage our way through a pandemic?

Cloud computing -- can we move our operations to it during a moderate to severe
pandemic? Let's talk about it and come up with ways we can offload some
management tasks to the cloud.

http://cwflyris.computerworld.com/t/4914665/283856143/186852/0/

Douglas Schweitzer: Try not to panic is easier said than done

Last year I saved someone's life. I was at work and my administrative assistant
of 15 years was in the conference room down the hall eating her lunch with
several of the other women in the office. She was eating a chicken nugget and
started to choke. Embarrassed, she quickly but quietly got up and ran down the
hall and past my office toward the ladies room figuring she could cough it out.
Starting to black out she staggered back up the hall and into my office
clutching her throat but not able to speak. I jumped from behind my desk and
spun her around and did the Heimlich.

http://cwflyris.computerworld.com/t/4914665/283856143/186853/0/

Mark Everett Hall: Panda pushes new free hybrid security service for PCs

Despite spending lots of money for anti-malware tools, people's machines
continue to get infected. One European vendor thinks it has improved PC
protection significantly with a new, free service.

http://cwflyris.computerworld.com/t/4914665/283856143/186854/0/

Where PCI DSS Still Falls Short and How to Improve It

There's no doubt that the mere existence of a uniform policy -- adopted,
recommended and even mandated by such firm rivals as American Express, Visa and
MasterCard -- is a huge step forward.
http://cwflyris.computerworld.com/t/4914665/283856143/186855/0/

Scott McPherson: New IT flu pandemic presentation, checklist available.

These tools are designed to help you and your IT shop plan for an influenza
pandemic, and to familiarize yourself with the history of influenza in
easy-to-understand terms.

http://cwflyris.computerworld.com/t/4914665/283856143/186856/0/

***************SPONSOR**************************************

Open Source Security Myths Dispelled
Open Source Software is computer software whose source code is available to the
general public. When choosing between proprietary and open source security
solutions, organizations are misled by myths. As a result, they ask the wrong
questions when evaluating their options and unnecessarily limit their solutions.
This white paper will help dispel myths, allowing IT decision makers to focus on
more important organizational issues.

http://cwflyris.computerworld.com/t/4914665/283856143/186126/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=b5a44f19

************************************************************


SHARK BAIT OF THE DAY
_____________________

Computer possessed by galactic signals

I received a baffling e-mail from a user today: "Today while doing some
paperwork at my desk, but not using the computer, it suddenly came on showing
four different split screens, each showing different galactic pictures, with
appropriate numerical designations, and doing various mathematical equations in
each ... "

http://cwflyris.computerworld.com/t/4914665/283856143/186778/0/

SEEKING THE VERY BEST IT LEADERS
________________________________

Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at

http://cwflyris.computerworld.com/t/4914665/283856143/183552/0/
(Send questions to premier100@computerworld.com.)


NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwflyris.computerworld.com/t/4914665/283856143/156832/0/

COMPUTERWORLD ON TWITTER
________________________

Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/4914665/283856143/126780/0/


___________CONTACTS/SUBSCRIPTIONS___________________________


FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com


ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.


PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4914665/283856143/72509/0/

SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.

To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4914665/283856143/72510/0/

To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4914665/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00OTE0NjY1&x=908451b0

If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.

Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4914665/283856143/72511/0/

Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701

No comments: