Search This Blog

Friday, June 19, 2009

Is a Federal Cloud Computing CTO a good or bad thing?

Top 10 wicked cool algorithms ; Hackers dissect Palm Pre, webOS
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Brocade
rule

Get Comprehensive Enterprise Security with Gateway's Best-of-Breed Solutions
The Internet offers tremendous opportunities for today's businesses, but with that potential comes security risks. From the proliferation of malware, blended attacks, phishing, and spyware contained in Web, FTP, Voice over Internet Protocol (VoIP), and e-mail traffic, security threats increase along with growth opportunities. Combining Brocade's high-performance infrastructure and McAfee's Web gateway solution ensures that organizations have the secure and trusted environments they demand.

rule

Spotlight Story
Is a Federal Cloud Computing CTO a good or bad thing?

Read full story

Related News:

Top 10 wicked cool algorithms

Hackers dissect Palm Pre, webOS
A week after the release of the Palm Pre, hackers are eagerly dissecting and sifting through the webOS software that powers it.

Cloud security concerns don't register with many businesses
Only about half of businesses looking to use cloud services have their eye on some of the key potential security issues.

In Iran, cyber-activism without the middle-man
Anthony Papillion says he just wants to give Iranians a voice, but the word on Twitter these days is that he's not to be trusted.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


VMware's vSphere reviewed
vSphereWe found 5 things to love and 5 things to hate about VMware's vSphere.

Take the quiz
IT quizAre you a net know-it-all? Prove it.

Is Your Company Prepared for the Unexpected?
In this live webcast, June 25, 2009, you'll hear how to prepare the network now to seamlessly continue business operations during a major crisis, as well as a case study of an organization that has implemented a business continuity network plan.
Register now.


 

June 19, 2009

TOP STORIES | MOST DUGG STORIES

  1. Hackers dissect Palm Pre, webOS
  2. Nine Ball attack strikes 40,000 Web sites
  3. Apple's window to gain PC market share is narrowing
  4. Apple delays iPhone 3.0 launch
  5. Ex-Googlers behind new security service
  6. BlackBerry Tour smartphone announced
  7. Gadgets for any kind of techie Dad
  8. Data center derby heats up
  9. IT job market update: Hiring stalled, salaries slashed
  10. Google urged to beef up Gmail security

Email Security – Enforcing Corporate Policy in the Cloud
For IT departments to guard their organization's email, they have historically introduced a sprawling array of isolated point systems resulting in a fractured environment with multiple points of failure and fragmented administration. This Webinar will expose the myths of moving email security to the cloud, why this choice can save you time and resources, and what to look for from a cloud vendor.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: