security may update

Upload: georgiana-mateescu

Post on 03-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 Security May Update

    1/39

  • 8/11/2019 Security May Update

    2/39

  • 8/11/2019 Security May Update

    3/39

    http://www.websense.com/mobile
  • 8/11/2019 Security May Update

    4/39

  • 8/11/2019 Security May Update

    5/39

    mailto:[email protected]:[email protected]://searchsecurity.techtarget.com/news/2240147283/Verizon-2012-DBIR-recommends-log-analysis-and-password-managementhttp://searchsecurity.techtarget.com/news/2240147283/Verizon-2012-DBIR-recommends-log-analysis-and-password-managementhttp://whatis.techtarget.com/definition/0,,sid9_gci774854,00.htmlhttp://searchsecurity.techtarget.com/news/2240147282/Verizon-DBIR-2012-Automated-large-scale-attacks-taking-down-SMBshttp://searchsecurity.techtarget.com/news/2240147282/Verizon-DBIR-2012-Automated-large-scale-attacks-taking-down-SMBshttp://itknowledgeexchange.techtarget.com/security-wire-weekly/verizon-dbir-2012-overview-attack-mitigation-strategies/http://searchsecurity.techtarget.com/magazineContent/Computer-security-education-shouldnt-be-limited-to-tech-pros
  • 8/11/2019 Security May Update

    6/39

    http://searchsecurity.techtarget.com/magazineContent/Computer-security-education-shouldnt-be-limited-to-tech-pros
  • 8/11/2019 Security May Update

    7/39

    mailto:[email protected]:[email protected]://searchsecurity.techtarget.com/magazineContent/New-cybersecurity-training-program-targets-high-schoolers
  • 8/11/2019 Security May Update

    8/39

    http://www.isaca.org/benefits-ISM
  • 8/11/2019 Security May Update

    9/39

    http://searchmobilecomputing.techtarget.com/definition/mobile-device-managementhttp://searchsecurity.techtarget.in/news/2240106459/BYOD-risk-outweighs-benefits-56-of-ISACAs-Indian-Survey-respondents
  • 8/11/2019 Security May Update

    10/39

  • 8/11/2019 Security May Update

    11/39

    http://searchcio.techtarget.com/Information-security-risk-management-and-compliance-staffing-guidehttp://searchsecurity.techtarget.com/resources/Information-Security-Jobs-and-Training
  • 8/11/2019 Security May Update

    12/39

  • 8/11/2019 Security May Update

    13/39

  • 8/11/2019 Security May Update

    14/39

    mailto:[email protected]://www.infosecleaders.com/
  • 8/11/2019 Security May Update

    15/39

    http://www.eset.com/us/business
  • 8/11/2019 Security May Update

    16/39

    http://searchconsumerization.techtarget.com/feature/Mobile-security-policieshttp://searchconsumerization.techtarget.com/definition/BYOD-policyhttp://searchconsumerization.techtarget.com/tip/Mobile-application-security-best-practices-Leveraging-MDM-MAM-toolshttp://searchsecurity.techtarget.com/news/2240111501/Mobile-device-management-market-offers-mobile-device-security-options
  • 8/11/2019 Security May Update

    17/39

    http://searchmobilecomputing.techtarget.com/tip/Best-practices-for-corporate-mobile-device-management-Mobile-management-Part-VIIIhttp://technet.microsoft.com/en-us/library/aa998357.aspxhttp://searchconsumerization.techtarget.com/definition/BlackBerry-Enterprise-Server-BEShttp://searchnetworking.techtarget.com/feature/Mobile-device-security-best-practices-for-BYOD
  • 8/11/2019 Security May Update

    18/39

  • 8/11/2019 Security May Update

    19/39

  • 8/11/2019 Security May Update

    20/39

  • 8/11/2019 Security May Update

    21/39

    http://searchcompliance.techtarget.com/tip/Mobile-malware-targeted-attacks-top-online-security-threats-in-2012
  • 8/11/2019 Security May Update

    22/39

    mailto:[email protected]
  • 8/11/2019 Security May Update

    23/39

    http://www.searchsecurity.com/http://www.searchsecurity.com/http://www.searchfinancialsecurity.com/http://www.searchsecurity.co.uk/http://www.searchmidmarketsecurity.com/http://www.searchsecuritychannel.com/
  • 8/11/2019 Security May Update

    24/39

    http://searchcloudsecurity.techtarget.com/news/1354325/VMware-releases-long-awaited-VMsafe-security-APIhttp://searchsecurity.techtarget.com/news/1302712/VMware-to-release-APIs-to-security-vendors-under-VMsafehttp://searchsecurity.techtarget.com/news/1302712/VMware-to-release-APIs-to-security-vendors-under-VMsafe
  • 8/11/2019 Security May Update

    25/39

    http://searchcloudcomputing.techtarget.com/feature/Piecing-together-VMwares-cloud-strategyhttp://searchsecurity.techtarget.com/magazineContent/Marcus-Ranum-chat-Security-startups-and-security-innovation
  • 8/11/2019 Security May Update

    26/39

    http://searchcloudsecurity.techtarget.com/definition/AV-storm
  • 8/11/2019 Security May Update

    27/39

    http://searchcloudsecurity.techtarget.com/news/2240073997/VMware-boosts-VM-security-with-PacketMotion-purchasehttp://searchcloudsecurity.techtarget.com/news/2240073997/VMware-boosts-VM-security-with-PacketMotion-purchase
  • 8/11/2019 Security May Update

    28/39

    http://searchsecurity.techtarget.com/news/2240035818/VMware-acquires-Shavlik-Technologies-for-vulnerability-configuration-managementhttp://searchcloudsecurity.techtarget.com/news/2240073997/VMware-boosts-VM-security-with-PacketMotion-purchasehttp://searchsecurity.techtarget.com/news/1268544/VMware-acquires-HIPS-provider-Determinahttp://searchsecurity.techtarget.com/news/1268544/VMware-acquires-HIPS-provider-Determina
  • 8/11/2019 Security May Update

    29/39

  • 8/11/2019 Security May Update

    30/39

  • 8/11/2019 Security May Update

    31/39

  • 8/11/2019 Security May Update

    32/39

    mailto:[email protected]:[email protected]://searchsecurity.techtarget.com/guides/RSA-Conference-2012-Special-Conference-Coverage
  • 8/11/2019 Security May Update

    33/39

  • 8/11/2019 Security May Update

    34/39

    http://searchcio-midmarket.techtarget.com/definition/FUDhttp://searchcio-midmarket.techtarget.com/definition/FUDhttp://searchsecurity.techtarget.com/tip/How-to-avoid-DLP-implementation-pitfallshttp://searchsecurity.techtarget.com/news/1528053/Data-loss-prevention-best-practices-start-with-slow-incremental-rollouts
  • 8/11/2019 Security May Update

    35/39

  • 8/11/2019 Security May Update

    36/39

    http://searchsecurity.techtarget.com/tip/Five-endpoint-DLP-deployment-data-security-tips
  • 8/11/2019 Security May Update

    37/39

    http://searchfinancialsecurity.techtarget.com/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standardhttp://searchdatamanagement.techtarget.com/definition/HIPAAhttp://searchsecurity.techtarget.com/definition/Transport-Layer-Security-TLS
  • 8/11/2019 Security May Update

    38/39

    http://searchfinancialsecurity.techtarget.com/tip/Considerations-for-buying-and-implementing-DLP-solutions
  • 8/11/2019 Security May Update

    39/39