Page 2 - CDM-Cyber-Warnings-March-2014
P. 2
CONTENTS CYBER WARNINGS Published monthly by Cyber Defense Being One Step Ahead of the Next Threat… .............................3 Magazine and distributed electronically via Encryption as a Service.............................................................6 opt-in Email, HTML, PDF and Online Flipbook formats. Effectively removing the obstacles to cloud adoption .................6 How Government Organizations Can Stay Secure When Going PRESIDENT Mobile........................................................................................9 Stevin Victor Don’t Get Washed Away by the Perfect Storm.........................11 [email protected] Cloud Providers, Security Vendors, and You: Working Together EDITOR for the Best Cyber Defense......................................................15 PierLuigi Paganini, CEH Let’s Be Careful Out There: Securing File Transfers................18 [email protected] Are You Flirting with Data Disaster? ........................................21 Best Practices in Cybersecurity: Adopting a Cyber Playbook...23 ADVERTISING Microsoft Leads the List of Most Vulnerable Vendors for 2013.26 Jessica Quinn [email protected] The Best Defense is a Good Offense.......................................31 BYOD security challenges: Protecting your enterprise data .....34 KEY WRITERS AND CONTRIBUTORS Cyber Security ideas for small businesses...............................36 Pierluigi Paganini How Proper Cyber Security can ensure a safe business?........39 J.R. Cunningham The Next Generation of SIEM Can Be Found In Security Keith Ross Analytics..................................................................................41 Håkan Saxmo Understanding and Combating “Cyber Terrorism” at Jim DeMerlis International Level ...................................................................48 Shawn Sweeney Effective use of DRM...............................................................51 Richard McMunn One-stop Shopping Service for Storage System Configurations54 Milica Djekic Moving Security From the Mobile Back Burner ........................57 Amarish Pathak Vinod Mohan Reinforcing The Human Firewall..............................................59 Tony Perri SaaS – A growing industry with a change of heart ...................61 Peter Simon State of Mergers and Acquisitions in the Cyber Defense World64 and many more… Software-Based Authentication Delivers More Modern, More Interested in writing for us: Reliable and More Cost-Effective Security...............................71 [email protected] IT Security: Not just important, it’s essential.............................74 CONTACT US: A three step process to ensure there is no backdoor access to your encrypted data.................................................................77 Cyber Defense Magazine Top 3 Myths About Antivirus Software .....................................84 Toll Free: +1-800-518-5248 NSA Spying Concerns? Learn Counterveillance......................87 Fax: +1-702-703-5505 SKYPE: cyber.defense Top Twenty INFOSEC Open Sources......................................89 Magazine: http://www.cyberdefensemagazine.com National Information Security Group Offers FREE Techtips .....90 Copyright (C) 2014, Cyber Defense Magazine, a division of STEVEN G. SAMUELS LLC Job Opportunities ....................................................................91 848 N. Rainbow Blvd. #4496, Las Vegas, NV 89107. EIN: 454-18-8465, DUNS# 078358935. Free Monthly Cyber Warnings Via Email..................................91 All rights reserved worldwide. [email protected] Cyber Warnings Newsflash for March 2014.............................94 Executive Producer: RSA Conference 2014 Trip Report: Special Supplement ......124 Gary S. Miliefsky, CISSP® " # % " $ " # ! !
   1   2   3   4   5   6   7