Wednesday, May 8, 2013

Syria Has 24-Hour Net Outage | Password Security Strategy: Honeywords

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, May 8, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Syria Back Online After Internet Blackout
By Mathew J. Schwartz
All Internet traffic from the war-torn country -- via overland and submarine connections -- went offline Tuesday.

MUST READ
Anonymous OpUSA Hackathon: Mostly Bluster
DHS predicts Tuesday's hackathon will involve little more than nuisance exploits. Meanwhile, Syrian Electronic Army hacks Twitter feeds of The Onion.

Sweet Password Security Strategy: Honeywords
To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, say RSA researchers.

Why IT Spending Is Stuck In A Vicious Circle
Respondents to our IT Spending Priorities Survey say they're playing catch-up.

BlackBerry, Samsung Get Pentagon Nod Of Approval
Department of Defense approves use of BlackBerry and Samsung devices by military and government workers, a big win for the two companies.

  Digital Issue  
INSIDE THE LATEST ISSUE OF INFORMATIONWEEK
Our 2013 IT Spending Priorities Survey shows IT pros are playing catch-up after a period of underfunding.

ALSO:
• Twitter's security boost might be too little, too late. • Assumptions can kill an IT project, cautions Comcast's tech chief.

Log In Or Register To Download

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Managing Mobile Security in Small and Midsize Businesses
When it comes to mobile security, some concerns are common across all organizations. One of the biggest is the surge in the use of personal devices for business purposes -- otherwise known as BYOD. However, the challenges for SMBs are heightened because these organizations often lack resources and expertise. We examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Google Glass Gets Smeared: 11 Improvement Ideas
Comedians and pundits are making a mockery of Google Glass. Here are 11 ways Google could get the last laugh.

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Apple, Samsung Chew Up Smartphone Profits
Samsung eats into Apple's profits in Q1, but the two smartphone giants' closest competitor took only 1% of the sector's profits.

FedEx Makes Strategic Shift
As part of a broader strategy to cut costs and modernize its IT, FedEx offered a voluntary buyout to IT and select other workers as it adjusts its talent mix by giving more work to service providers.
 

WEBCASTS:

Distilling Hadoop Patterns of Use and How You Can Use Them to Get Started Today
Attend our webinar on Tuesday, May 14, 2013 to discover where Hadoop most often fits into the data landscape for the typical enterprise. You'll hear how common patterns of use can simplify your approach and help you to find a usage that makes sense for your business.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment