Wednesday, May 22, 2013

Dropbox Adopts Single Sign-On | Data Breaches: 8 Common Causes

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, May 22, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Dropbox Adopts Single Sign-On Technology
By Mathew J. Schwartz
Dropbox says any off-the-shelf or homegrown identity management system can be configured to automatically sign users into its service.

MUST READ
Data Breaches: 8 Most Common Causes
Why do bad breaches happen to good companies? Here's a look at the most frequent causes.

Google Aurora Hack Was Chinese Counterespionage Operation
Attackers were after U.S. government surveillance requests for undercover Chinese operatives, say former government officials.

Anonymous Threatens Gitmo, U.S. Locks Down Wi-Fi
Guantanamo Bay Naval Base authorities turn off Wi-Fi and social media after Anonymous threatened to shut them down.

Amazon Cloud Gets Federal Stamp Of Approval
FedRAMP compliance means federal agencies can now access Amazon Web Services almost immediately, without spending months on their own security assessments.

  Digital Issue  
INSIDE THE LATEST ISSUE OF INFORMATIONWEEK GOVERNMENT
Meet The Top 25 Government CIOs: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.

ALSO: Video Surveillance -- It's not just about networked cameras anymore.

Log In Or Register To Download

 


 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Managing Mobile Security in Small and Midsize Businesses
When it comes to mobile security, some concerns are common across all organizations. One of the biggest is the surge in the use of personal devices for business purposes -- otherwise known as BYOD. However, the challenges for SMBs are heightened because these organizations often lack resources and expertise. We examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Flickr Can Store Any Data, Not Just Photos
Flickr offers a terabyte of free data, but, thanks to an outside developer, photographers may not be the only ones who find a way to use that space.

IBM Eats Its Own Social Dog Food
Big Blue's social business VP details how IBM Connections fuels the company's 500,000 users with social capabilities and a social media mindset.

8 Free, Must-Have Windows 8 Apps
These free Windows 8 apps will help you and your business bootstrap your way to using Microsoft's new OS productively.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

 

WEBCASTS:

Secure Cloud: Taking Advantage of the Intelligent WAN
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won't want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud. It happens Wednesday, June 12, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment