Wednesday, June 19, 2013

What Prism Knows: 8 Facts | NSA Tests IT Access Control

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, June 19, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist NSA Tests IT Access Control Restrictions
By Mathew J. Schwartz
Could two-person access requirements and better automation prevent future leaks?

MUST READ
What Prism Knows: 8 Metadata Facts
Data traffic analysis could provide "megadata" intelligence agencies can use to cross-reference information using big data techniques.

Security ROI: 5 Practices Analyzed
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

Google Challenges Surveillance Gag Order
Google argues it has a First Amendment Right to report the number of demands for information it receives under national security laws.

Google Defends Efforts Against Rogue Pharmacies
Under fire from law enforcement officials, Google insists it has been making progress in its effort to deny advertising to rogue pharmacies.

FBI Driver's License Photo Searches Raise Privacy Questions
Facial-recognition software advances allow law enforcement and government agencies to match images of unknown suspects with government-issued ID photos.

Privacy Concerns: Big Data's Biggest Barrier?
Businesses must be up front with consumers about what data they're using and why. Opting out should be easier, too.

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
The 8 Most Common Causes of Data Breaches
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business -- and its customers and partners -- at risk. To keep your own organization out of the news, it's important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Seven Steps to Security
Download this paper learn seven practical steps to begin an application security program and methods of measuring application security program success.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Google Challenges Surveillance Gag Order
Google argues it has a First Amendment Right to report the number of demands for information it receives under national security laws.

Windows 8.1: 10 Surprise Benefits
Windows 8.1 does a lot more than bring back the Start button. These 10 features may give it a much-needed popularity boost with enterprise users.

Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing use of sophisticated security IT systems nationwide.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

10 Tools To Beat Email Overload
New tools and services promise to help you put more love into your love-hate relationship with email. We check out the contenders.
 

WEBCASTS:

Secure Cloud: Taking Advantage of the Intelligent WAN
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won't want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud. It happens Wednesday, June 12, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment