Search This Blog

Thursday, April 30, 2009

Verification of cloud security

Verification of cloud security should be based on facts, not on assumptions
Network World logo

Cloud Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Live Webcast: SaaS, SOA, cloud computing
Bring disturbed applications to your remote sites with confidence. Leverage modern application architectures including SaaS, cloud computing, and app centralization. Topics covered will include: guaranteeing mission critical services and supporting dynamic bandwidth allocation. This live event scheduled for Tuesday May 12, 2009 at 1:00 p.m. ET/10:00 a.m. Register for this Live Webcast now.

rule

Spotlight Story
Verification of cloud security

Tim Greene By Tim Greene
Verification of cloud security is difficult but also important so businesses need to figure out the best way to handle this. Read full story

Tim Greene is senior editor at Network World.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Group proposes cloud management standard DMTF creates new group dubbed the Open Cloud Standards Incubator, which will be dedicated to addressing the need for open management standards for cloud computing.

Cloud computing security: Who knew? Bradner: Security has not been much of a consideration in cloud computing - but that may be about to change.

Cloud Standards: Trickier than Nailing Jell-O to a Wall Just try creating a definition of cloud computing that's broad enough to encompass all its permutations and narrow enough to provide technical guidance on how to get one cloud talking to another.

Security promises in the cloud A survey released this week at RSA is troubling in that it says businesses using cloud services are concerned about security, but don't verify what providers do to meet the security promises they make.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Juniper Networks
rule

Live Webcast: SaaS, SOA, cloud computing
Bring disturbed applications to your remote sites with confidence. Leverage modern application architectures including SaaS, cloud computing, and app centralization. Topics covered will include: guaranteeing mission critical services and supporting dynamic bandwidth allocation. This live event scheduled for Tuesday May 12, 2009 at 1:00 p.m. ET/10:00 a.m. Register for this Live Webcast now.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

04/30/09

Today's most-read stories:

  1. Swine flu threat raises telework questions
  2. Microsoft targets Windows, Linux management
  3. It takes a village idiot: The jerks of online forums
  4. Seven burning security questions
  5. Oracle, Sun deal brings back the glory days of FUD
  6. Military enlists open source community
  7. More ways to manage IP addresses
  8. 57 amazing things you didn't know your tech could do!
  9. The first 10 rules of Twittiquette
  10. BizTalk Server 2009 ready for the public
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: