Wednesday, June 12, 2013

In Defense Of Prism's Big Data Tools | Prism Whistleblower: 9 Facts

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
Join the community
Facebook Twitter LinkedIn
  Wednesday, June 12, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Defending NSA Prism's Big Data Tools
By Doug Henschen
The more you know about NSA's Accumulo system and graph analysis, the less likely you are to suspect Prism is a privacy-invading fishing expedition.

MUST READ
NSA Prism Fallout Delays EU Airline Database Vote
Accusations of "paranoia" and discrimination against non-U.S. citizens aired in Brussels this week -- though working with America on security was also a theme.

NSA Prism: Patriot Act Author Questions Scope
White House says NSA's surveillance programs implement FISA and Patriot Act -- but Patriot Act author is not sure. Meanwhile, privacy groups turn up the heat.

NSA Prism: Snowden Is Wrong, Says British Government
Foreign Secretary denies that British government used Prism program to access communications of private citizens, but questions remain.

9 Facts About NSA Prism Whistleblower
Here's what we know about Edward J. Snowden, the NSA contractor last seen in Hong Kong -- and why the Bradley Manning case could affect Snowden's fate.

NSA Prism Relies Heavily On IT Contractors
NSA whistleblower Snowden likely enjoyed access to Prism program details as a contracted NSA IT administrator.

Microsoft: SMB Cloud Security Worries Easing
Microsoft survey of 211 small businesses finds half use the cloud and after early experience, find it more reliable, secure.

Federal Agencies Graded On Cybersecurity
White House report on cybersecurity goals shows agencies are making progress to keep federal IT systems safe, but they might miss 2014 targets.

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
The 8 Most Common Causes of Data Breaches
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business -- and its customers and partners -- at risk. To keep your own organization out of the news, it's important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Switching Managed SSL Service Providers
Switching to a new Certificate Authority for your SSL certificates is not a simple process, but it is not nearly as complicated as your incumbent CA may suggest. This white paper will help you decide your enterprise SSL needs by structuring the main considerations you must evaluate.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

8 Apple Changes That Matter
Amid Apple's two operating system updates, new hardware and new services, these pieces of news from WWDC 2013 stand out.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

Apple iOS 7's Best Features
At WWDC 2013 on Monday, Apple announced iOS 7 for the iPhone and iPad. Check out the new mobile platform's advantages.

8 Free, Must-Have Windows 8 Apps
These free Windows 8 apps will help you and your business bootstrap your way to using Microsoft's new OS productively.


 

WEBCASTS:

Secure Cloud: Taking Advantage of the Intelligent WAN
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won't want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud. It happens Wednesday, June 12, 2013.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
E2 Conference Boston
E2 is the only event of its kind, bringing together business and technology leaders looking for new ways to evolve their enterprise applications strategy and achieve business value. Join us in Boston, June 17-19, for three days of 40+ conference sessions and workshops across eight tracks and discover the latest insights in enterprise social software, big data and analytics, mobility, cloud, SaaS and APIs, UI/U, and more.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment