System News
back1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Rock
01 Dec 2014 InformationWeek's 2014 Chief of the Year Cathy Bessant: What I Believe [39733]
Information Week, December 1st, 2014

"InformationWeek's 2014 Chief of the Year shares what being a cancer survivor taught her, why she dislikes rock-star CIOs, and more.

On not coming up through the technology ranks:

"If I was a classically trained technologist, I would be great at Cobol. And I probably would have come up through the technology side of the company during that period of time when technology and the business really were separate, when technology was thought of as the black box, when the budgets weren't integrated and understood. All kinds of preparation can work for sitting in the kind of job that I sit in today. But now, five years later, I look at the alternative and I feel very fortunate to have come at it from this direction."
(Get More Information . .) open to premium members only

26 Oct 2014 Researcher Builds System to Protect Against Malicious Insiders [38948]
ComputerWorld, October 14th, 2014

"When an employee turns on his own company, the results -- damaged networks, data theft and even work stoppage -- could be devastating," warns Sharon Gaudin in ComputerWorld.

"It could rock the company even more than an outside attack because the insider knows where sensitive data is kept, what the passwords are and exactly how to hurt the company the most.

That's the driving force behind the work that Daphne Yao, associate professor of computer science at Virginia Tech, is doing on cybersecurity..."
(Get More Information . .) open to premium members only

14 Oct 2014 Researcher Builds System to Protect Against Malicious Insiders [38890]
ComputerWorld, October 14th, 2014

"When an employee turns on his own company, the results -- damaged networks, data theft and even work stoppage -- could be devastating.

It could rock the company even more than an outside attack because the insider knows where sensitive data is kept, what the passwords are and exactly how to hurt the company the most.

That's the driving force behind the work that Daphne Yao, associate professor of computer science at Virginia Tech, is doing on cybersecurity..."
(Get More Information . .) open to premium members only

30 Jun 2014 Shadow apps: Turning SaaS risk into CIO strategy [37244]
SearchCIO, June 30th, 2014

"CIOs are between a rock and a hard place with respect to the adoption -- make that uncontrolled, unsanctioned adoption -- of SaaS apps by their business users. Turn a blind eye to the use of cloud-based apps by the business and CIOs may be putting their enterprises at greater risk of a data breach -- three times greater risk, according to a recent study from the Ponemon Institute.

Clamping down on shadow apps, on the other hand, risks being labeled a "CI-no," a rubric no CIO can afford to court, even for the sake of information security...."
(Get More Information . .) open to premium members only

16 Apr 2014 The Real Wakeup Call from Heartbleed [35892]
Help Net Security, April 16th, 2014

"There's nothing special about Heartbleed. It's another flaw in a popular library that exposed a lot of servers to attack. The danger lies in the way software libraries are built and whether they can be trusted.

In case you live under a rock, a serious security flaw was disclosed last week in the widely used OpenSSL library. On a threat scale of 1 to 10, well known security expert Bruce Schneier rated it an 11. Essentially, an attacker can send a "heartbeat" request that tricks the server into sending random memory contents back to the attacker. If the attacker gets lucky, that memory contains interesting secrets like passwords, session IDs, Social Security numbers, or even the server's private SSL key..."
(Get More Information . .) open to premium members only

 
back1 2 3 4 5 6 7 8 9 10 11 next






!-- end archive_section.tpl -->