ACLU: You can kiss trust in software updates goodbye if Apple's forced to help 
the FBI 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTYvYXBwbGUtaW9zL2FjbHUteW91LWNhbi1raXNzLXRydXN0LWluLXNvZnR3YXJlLXVwZGF0ZXMtZ29vZGJ5ZS1pZi1hcHBsZXMtZm9yY2VkLXRvLWhlbHAtdGhlLWZiaS5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aG4a51c364>

• Email not displaying correctly? View it in your browser 
<http://link.computerworld.com/view/562116b43b35d0943d8b495a3pdf7.kt8/638e3b52>.

<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbT90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aC358b66a9>

Computerworld Security
Mar 03, 2016 {include "Editors Note"}



Featured Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTUvZGF0YS1wcml2YWN5L3RoZS1pcm9ueS1pbi10aGUtZmJpcy1yZXF1ZXN0LXRvLXVubG9jay10aGUtaXBob25lLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aEafcaf4dc>
    The irony in the FBI's request to unlock the iPhone  
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTUvZGF0YS1wcml2YWN5L3RoZS1pcm9ueS1pbi10aGUtZmJpcy1yZXF1ZXN0LXRvLXVubG9jay10aGUtaXBob25lLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aFafcaf4dc>

As the FBI presses forward with its court case to force Apple to create 
software to unlock an iPhone used by one of the San Bernardino terrorists, it 
could be opening a huge security hole for government employees everywhere.  
Read More  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTUvZGF0YS1wcml2YWN5L3RoZS1pcm9ueS1pbi10aGUtZmJpcy1yZXF1ZXN0LXRvLXVubG9jay10aGUtaXBob25lLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aGafcaf4dc>

Twitter 
<http://link.computerworld.com/click/6222643.26972/aHR0cHM6Ly90d2l0dGVyLmNvbS8_c3RhdHVzPWh0dHA6Ly93d3cuY29tcHV0ZXJ3b3JsZC5jb20vYXJ0aWNsZS8zMDQwMzU1L2RhdGEtcHJpdmFjeS90aGUtaXJvbnktaW4tdGhlLWZiaXMtcmVxdWVzdC10by11bmxvY2stdGhlLWlwaG9uZS5odG1sJTIzdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDMmdG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aCce5d0b4b>
 Facebook 
<http://link.computerworld.com/click/6222643.26972/aHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL3NoYXJlci5waHA_dT1odHRwOi8vd3d3LmNvbXB1dGVyd29ybGQuY29tL2FydGljbGUvMzA0MDM1NS9kYXRhLXByaXZhY3kvdGhlLWlyb255LWluLXRoZS1mYmlzLXJlcXVlc3QtdG8tdW5sb2NrLXRoZS1pcGhvbmUuaHRtbCUyM3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAzJnRva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmU/562116b43b35d0943d8b495aC6e254cbc>
 LinkedIn 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5saW5rZWRpbi5jb20vc2hhcmVBcnRpY2xlP21pbmk9dHJ1ZSZ1cmw9aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTUvZGF0YS1wcml2YWN5L3RoZS1pcm9ueS1pbi10aGUtZmJpcy1yZXF1ZXN0LXRvLXVubG9jay10aGUtaXBob25lLmh0bWwlMjN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMyZ0b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aC282eae60>

Your Must-Read Stories


• ACLU: You can kiss trust in software updates goodbye if Apple's forced to 
help the FBI 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTYvYXBwbGUtaW9zL2FjbHUteW91LWNhbi1raXNzLXRydXN0LWluLXNvZnR3YXJlLXVwZGF0ZXMtZ29vZGJ5ZS1pZi1hcHBsZXMtZm9yY2VkLXRvLWhlbHAtdGhlLWZiaS5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aH4a51c364>
 
• Make threat intelligence meaningful: A 4-point plan 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTcvc2VjdXJpdHkvbWFrZS10aHJlYXQtaW50ZWxsaWdlbmNlLW1lYW5pbmdmdWwtYS00LXBvaW50LXBsYW4uaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aFede029eb>
 
• Attack against TLS shows the pitfalls of weakening encryption 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAyMDYvc2VjdXJpdHkvYXR0YWNrLWFnYWluc3QtdGxzLXNob3dzLXRoZS1waXRmYWxscy1vZi13ZWFrZW5pbmctZW5jcnlwdGlvbi5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aF0200ab30>
 
• Arrest of Facebook exec, now freed, stirs debate in Brazil 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzMjgvc2VjdXJpdHkvYXJyZXN0LW9mLWZhY2Vib29rLWV4ZWMtbm93LWZyZWVkLXN0aXJzLWRlYmF0ZS1pbi1icmF6aWwuaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aFa4eb5f8d>
 
• Security in a data-driven IoT world 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwMzU2MDUvaW50ZXJuZXQtb2YtdGhpbmdzL3NlY3VyaXR5LWluLWEtZGF0YS1kcml2ZW4taW90LXdvcmxkLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aFb58842f6>
 
• Security startup spotlight: Illusive Networks 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82Mjk2NC9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1pbGx1c2l2ZS1uZXR3b3Jrcz90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aF63f976c4>
 
• Security startup spotlight: SafeBreach 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82MjkyNS9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1zYWZlYnJlYWNoP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aF05632a73>
  
White Paper: Blue Coat Systems

2H 2015 Shadow Data Report 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3Jlc291cmNlcy5jb21wdXRlcndvcmxkLmNvbS9jY2QvYXNzZXRzLzEwMzYyNS9kZXRhaWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aDa9513581>

The 2H 2015 report's findings are based on the analysis of nearly 63M documents 
Elastica customers are storing and sharing in popular collaboration and cloud 
file sharing services such as Box, Dropbox, Google Drive, and Office 365. Read 
More ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3Jlc291cmNlcy5jb21wdXRlcndvcmxkLmNvbS9jY2QvYXNzZXRzLzEwMzYyNS9kZXRhaWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aEa9513581>

 
Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTYvYXBwbGUtaW9zL2FjbHUteW91LWNhbi1raXNzLXRydXN0LWluLXNvZnR3YXJlLXVwZGF0ZXMtZ29vZGJ5ZS1pZi1hcHBsZXMtZm9yY2VkLXRvLWhlbHAtdGhlLWZiaS5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aI4a51c364>
   ACLU: You can kiss trust in software updates goodbye if Apple's forced to 
help the FBI 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTYvYXBwbGUtaW9zL2FjbHUteW91LWNhbi1raXNzLXRydXN0LWluLXNvZnR3YXJlLXVwZGF0ZXMtZ29vZGJ5ZS1pZi1hcHBsZXMtZm9yY2VkLXRvLWhlbHAtdGhlLWZiaS5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aJ4a51c364>

The ACLU today filed an amicus brief in federal court, taking Apple's side in 
the dispute about whether the company should be forced to help the FBI access 
an iPhone.  Read More  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTYvYXBwbGUtaW9zL2FjbHUteW91LWNhbi1raXNzLXRydXN0LWluLXNvZnR3YXJlLXVwZGF0ZXMtZ29vZGJ5ZS1pZi1hcHBsZXMtZm9yY2VkLXRvLWhlbHAtdGhlLWZiaS5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aK4a51c364>


Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTcvc2VjdXJpdHkvbWFrZS10aHJlYXQtaW50ZWxsaWdlbmNlLW1lYW5pbmdmdWwtYS00LXBvaW50LXBsYW4uaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aGede029eb>
  
INSIDER  Make threat intelligence meaningful: A 4-point plan 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTcvc2VjdXJpdHkvbWFrZS10aHJlYXQtaW50ZWxsaWdlbmNlLW1lYW5pbmdmdWwtYS00LXBvaW50LXBsYW4uaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aHede029eb>

Threat intelligence is a hot topic, but it requires a ton of work to be 
operational and effective. Here's how to steer clear of the traps.  Read More  
▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzNTcvc2VjdXJpdHkvbWFrZS10aHJlYXQtaW50ZWxsaWdlbmNlLW1lYW5pbmdmdWwtYS00LXBvaW50LXBsYW4uaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aIede029eb>


Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAyMDYvc2VjdXJpdHkvYXR0YWNrLWFnYWluc3QtdGxzLXNob3dzLXRoZS1waXRmYWxscy1vZi13ZWFrZW5pbmctZW5jcnlwdGlvbi5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aG0200ab30>
   Attack against TLS shows the pitfalls of weakening encryption 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAyMDYvc2VjdXJpdHkvYXR0YWNrLWFnYWluc3QtdGxzLXNob3dzLXRoZS1waXRmYWxscy1vZi13ZWFrZW5pbmctZW5jcnlwdGlvbi5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aH0200ab30>

For the third time in under a year, security researchers have found a method to 
attack encrypted Web communications, a direct result of weaknesses that were 
mandated two decades ago by the U.S. government.  Read More  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAyMDYvc2VjdXJpdHkvYXR0YWNrLWFnYWluc3QtdGxzLXNob3dzLXRoZS1waXRmYWxscy1vZi13ZWFrZW5pbmctZW5jcnlwdGlvbi5odG1sP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aI0200ab30>


   
Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzMjgvc2VjdXJpdHkvYXJyZXN0LW9mLWZhY2Vib29rLWV4ZWMtbm93LWZyZWVkLXN0aXJzLWRlYmF0ZS1pbi1icmF6aWwuaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aGa4eb5f8d>
   Arrest of Facebook exec, now freed, stirs debate in Brazil 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzMjgvc2VjdXJpdHkvYXJyZXN0LW9mLWZhY2Vib29rLWV4ZWMtbm93LWZyZWVkLXN0aXJzLWRlYmF0ZS1pbi1icmF6aWwuaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aHa4eb5f8d>

The arrest of Diego Dzodan, the vice president of Facebook for Latin America, 
by Brazilian federal police on Tuesday morning in Sao Paulo has stirred up 
controversy in the country.  Read More  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwNDAzMjgvc2VjdXJpdHkvYXJyZXN0LW9mLWZhY2Vib29rLWV4ZWMtbm93LWZyZWVkLXN0aXJzLWRlYmF0ZS1pbi1icmF6aWwuaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aIa4eb5f8d>


Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwMzU2MDUvaW50ZXJuZXQtb2YtdGhpbmdzL3NlY3VyaXR5LWluLWEtZGF0YS1kcml2ZW4taW90LXdvcmxkLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aGb58842f6>
   Security in a data-driven IoT world 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwMzU2MDUvaW50ZXJuZXQtb2YtdGhpbmdzL3NlY3VyaXR5LWluLWEtZGF0YS1kcml2ZW4taW90LXdvcmxkLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aHb58842f6>

Data is the new driver for UX, and in this new world data is acquired from 
myriad sources creating a multi-dimensioned context within which to create new 
user engagements. A number of frameworks are starting to crop up that support 
this data-driven model, but the security of that data is still suspect.   Read 
More  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwMzU2MDUvaW50ZXJuZXQtb2YtdGhpbmdzL3NlY3VyaXR5LWluLWEtZGF0YS1kcml2ZW4taW90LXdvcmxkLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aIb58842f6>


Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82Mjk2NC9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1pbGx1c2l2ZS1uZXR3b3Jrcz90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aG63f976c4>
 

Video   Security startup spotlight: Illusive Networks 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82Mjk2NC9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1pbGx1c2l2ZS1uZXR3b3Jrcz90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aH63f976c4>

At the RSA Innovation Sandbox, CSO checks in with Illusive Networks, which 
plans on utilizing “Deceptions” across the network to trick hackers trying to 
break into a company’s system.  Watch Now  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82Mjk2NC9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1pbGx1c2l2ZS1uZXR3b3Jrcz90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJlI3RrLmN3X25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5X2lzc3Vlc18yMDE2LTAzLTAz/562116b43b35d0943d8b495aI63f976c4>


Thumbnail Image 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82MjkyNS9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1zYWZlYnJlYWNoP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aG05632a73>
 

Video   Security startup spotlight: SafeBreach 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82MjkyNS9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1zYWZlYnJlYWNoP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aH05632a73>

At the RSA Innovation Sandbox, CSO checks in with SafeBreach, which offers 
companies the chance to run hacking simulations on their systems to help 
identify weak points.  Watch Now  ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS92aWRlby82MjkyNS9zZWN1cml0eS1zdGFydHVwLXNwb3RsaWdodC1zYWZlYnJlYWNoP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmUjdGsuY3dfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzXzIwMTYtMDMtMDM/562116b43b35d0943d8b495aI05632a73>

 
White Paper: Cisco Systems

5 Steps For Securing The Data Center: Why Traditional Security May Not Work 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3Jlc291cmNlcy5jb21wdXRlcndvcmxkLmNvbS9jY2QvYXNzZXRzLzEwMzU5MS9kZXRhaWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aD2e335b12>

Datacenter admins face a significant challenge: They need to secure the 
datacenter without compromising the performance and functionality that new 
datacenter environments enable. Learn about the 5 steps you need to take to 
secure your data center. Read More ▶ 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3Jlc291cmNlcy5jb21wdXRlcndvcmxkLmNvbS9jY2QvYXNzZXRzLzEwMzU5MS9kZXRhaWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jd19ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXNfMjAxNi0wMy0wMw/562116b43b35d0943d8b495aE2e335b12>

 <!-- // Begin Editor Added Content \\ -->


<tr>
<td class="mobile_pad" colspan="2" align="left" valign="top" style="padding: 
20px 0 18px; display: block;">
 <h3 style="margin:0; padding: 0 0 3px 0;"> 
 <a class="mobile_hed" 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwMzgyNDAvaXQtbWFuYWdlbWVudC9yZWFkLWN3LXMtbWFyY2gtMjAxNi1kaWdpdGFsLW1hZ2F6aW5lLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jdHctaW5mc2Ii/562116b43b35d0943d8b495aBbfcd25b9
 target="_blank" style="font-family: Tahoma,Helvetica,Arial,sans-serif; 
font-size: 21px; line-height: 24px; color: #0b0b0b; font-weight: 700; 
text-decoration:none;"> The 2016 Premier 100 Technology Leaders</a> 
</h3>
<p class="mobile_art_dek" style="margin: 0; padding: 5px 0 5px 0; font-family: 
Helvetica, sans-serif; font-size: 15px; color: #7f7a79; 
mso-line-height-rule:exactly; line-height: 26px;">
Check out our March Digital Magazine, featuring this year’s class of honorees: 
The 2016 Premier 100 Technology Leaders. It’s a chaotic world for this year’s 
honorees, but that’s just how they like it, as they embrace countless ways to 
spearhead change at their organizations, from shaking up the IT structure to 
driving technology investments. The magazine also includes News Analysis, 
Opinions and Shark Tank -- all free for download with registration.
<a 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hcnRpY2xlLzMwMzgyNDAvaXQtbWFuYWdlbWVudC9yZWFkLWN3LXMtbWFyY2gtMjAxNi1kaWdpdGFsLW1hZ2F6aW5lLmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZSN0ay5jdHctaW5mc2Ii/562116b43b35d0943d8b495aCbfcd25b9
 target="_blank" style="font-family: Helvetica, sans-serif; color:#a31e22; 
text-decoration:none; font-weight: 500; text-decoration:none;"> View the 
magazine here <span style="font-size:80%; line-height:0;">&#9654;</span></a>
</p>
</td>
</tr>

<tr>
<td class="mobile_pad" colspan="2" align="left" valign="top" style="padding: 
20px 0 18px; display: block;">
<h3 style="margin:0; padding: 0 0 3px 0;"> 
<a class="mobile_hed" 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9uZXdzbGV0dGVycy9zaWdudXAuaHRtbCI_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aB23b596ac
 target="_blank" style="font-family: Tahoma,Helvetica,Arial,sans-serif; 
font-size: 21px; line-height: 24px; color: #0b0b0b; font-weight: 700; 
text-decoration:none;"> Subscribe to Computerworld Daily News</a> </h3>
<p class="mobile_art_dek" style="margin: 0; padding: 5px 0 5px 0; font-family: 
Helvetica, sans-serif; font-size: 15px; color: #7f7a79; 
mso-line-height-rule:exactly; line-height: 26px;">
 Sign up for our popular, twice-daily tech news newsletter. You'll get 
Computerworld's up-to-the-minute top stories of the day, both first thing in 
the morning and late in the afternoon (ET). We deliver breaking news on topics 
like the latest security threats and the newest mobile devices, in-depth 
features about enterprise technologies and IT careers, and authoritative 
analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and 
HP. 
<a 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9uZXdzbGV0dGVycy9zaWdudXAuaHRtbCI_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aC23b596ac
 target="_blank" style="font-family: Helvetica, sans-serif; color:#a31e22; 
text-decoration:none; font-weight: 500; text-decoration:none;"> Sign up now 
<span style="font-size:80%; line-height:0;">&#9654;</span></a>
</p>
</td>
</tr>

<tr>
<td class="mobile_pad" colspan="2" align="left" valign="top" style="padding: 
20px 0 18px; display: block;">
<h3 style="margin:0; padding: 0 0 3px 0;"> 
<a class="mobile_hed" 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jc29vbmxpbmUuY29tL25ld3NsZXR0ZXJzL3NpZ251cC5odG1sIj90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aB00d7d305
 target="_blank" style="font-family: Tahoma,Helvetica,Arial,sans-serif; 
font-size: 21px; line-height: 24px; color: #0b0b0b; font-weight: 700; 
text-decoration:none;"> Subscribe to CSO's Security Awareness Weekly</a> </h3>
<p class="mobile_art_dek" style="margin: 0; padding: 5px 0 5px 0; font-family: 
Helvetica, sans-serif; font-size: 15px; color: #7f7a79; 
mso-line-height-rule:exactly; line-height: 26px;">
 Sign up for a weekly roundup of features, news, tips and analysis on security 
awareness delivered to your inbox on Mondays. 
<a 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jc29vbmxpbmUuY29tL25ld3NsZXR0ZXJzL3NpZ251cC5odG1sIj90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aC00d7d305
 target="_blank" style="font-family: Helvetica, sans-serif; color:#a31e22; 
text-decoration:none; font-weight: 500; text-decoration:none;"> Sign up now 
<span style="font-size:80%; line-height:0;">&#9654;</span></a>
</p>
</td>
</tr>

<tr>
<td class="mobile_pad" colspan="2" align="left" valign="top" style="padding: 
20px 0 18px; display: block;">
<h3 style="margin:0; padding: 0 0 3px 0;"> 
<a class="mobile_hed" 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL2l0am9icy5jb21wdXRlcndvcmxkLmNvbSI_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aBdabf1185
 target="_blank" style="font-family: Tahoma,Helvetica,Arial,sans-serif; 
font-size: 21px; line-height: 24px; color: #0b0b0b; font-weight: 700; 
text-decoration:none;"> Computerworld Job Board</a> </h3>
<p class="mobile_art_dek" style="margin: 0; padding: 5px 0 5px 0; font-family: 
Helvetica, sans-serif; font-size: 15px; color: #7f7a79; 
mso-line-height-rule:exactly; line-height: 26px;">Search multiple listings now 
and get new job alerts as they are posted. <a 
href="http://link.computerworld.com/click/6222643.26972/aHR0cDovL2l0am9icy5jb21wdXRlcndvcmxkLmNvbSI_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aCdabf1185
 target="_blank" style="font-family: Helvetica, sans-serif; color:#a31e22; 
text-decoration:none; font-weight: 500; text-decoration:none;"> Check them out 
now <span style="font-size:80%; line-height:0;">&#9654;</span></a>
</p>
</td>
</tr> 
 
 <!-- // End Editor Added Content \\ --> 
 

Twitter 
<http://link.computerworld.com/click/6222643.26972/aHR0cHM6Ly90d2l0dGVyLmNvbS9jb21wdXRlcndvcmxkP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmU/562116b43b35d0943d8b495aC62b479e2>
 Facebook 
<http://link.computerworld.com/click/6222643.26972/aHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL0NvbXB1dGVyd29ybGQ_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aC538fe9a0>
 LinkedIn 
<http://link.computerworld.com/click/6222643.26972/aHR0cHM6Ly93d3cubGlua2VkaW4uY29tL2NvbXBhbnkvY29tcHV0ZXJ3b3JsZD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aC1e815db1>
 Google+ 
<http://link.computerworld.com/click/6222643.26972/aHR0cHM6Ly9wbHVzLmdvb2dsZS5jb20vJTJiY29tcHV0ZXJ3b3JsZC9wb3N0cz90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aC591bb1db>

You are currently subscribed to Computerworld Security as 
archive@mail-archive.com.

Unsubscribe from this newsletter 
<http://link.computerworld.com/oc/562116b43b35d0943d8b495a3pdf7.kt8/6d7efaa3&blist=computerworld_security>
 | Manage your subscriptions 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9uZXdzbGV0dGVycy9sb2ctaW4uaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aC8f286159>
 | Subscribe 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9uZXdzbGV0dGVycy9zaWdudXAuaHRtbD90b2tlbj0lMjN0ay5DVFdOTEVfbmx0X2NvbXB1dGVyd29ybGRfc2VjdXJpdHlfMjAxNi0wMy0wMyZpZGdfZWlkPThmNGYwN2NkMWRjYzljMGRhMTliZGUzODZiMjMzNjJl/562116b43b35d0943d8b495aEc6a2fa90>
 | Privacy Policy 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9hYm91dC9wcml2YWN5Lmh0bWw_dG9rZW49JTIzdGsuQ1RXTkxFX25sdF9jb21wdXRlcndvcmxkX3NlY3VyaXR5XzIwMTYtMDMtMDMmaWRnX2VpZD04ZjRmMDdjZDFkY2M5YzBkYTE5YmRlMzg2YjIzMzYyZQ/562116b43b35d0943d8b495aCd9752815>

Learn more about 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL3d3dy5jb21wdXRlcndvcmxkLmNvbS9pbnNpZGVyP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmU/562116b43b35d0943d8b495aCd1e66363>

Copyright (C) 2016 Computerworld 
<http://link.computerworld.com/click/6222643.26972/aHR0cDovL2NvbXB1dGVyd29ybGQuY29tP3Rva2VuPSUyM3RrLkNUV05MRV9ubHRfY29tcHV0ZXJ3b3JsZF9zZWN1cml0eV8yMDE2LTAzLTAzJmlkZ19laWQ9OGY0ZjA3Y2QxZGNjOWMwZGExOWJkZTM4NmIyMzM2MmU/562116b43b35d0943d8b495aC4b01740d>,
 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message. To contact someone directly, send an 
e-mail to onl...@computerworld.com <mailto:onl...@computerworld.com>.

 

Reply via email to