Search This Blog

Wednesday, August 12, 2009

VMware's purchase of SpringSource could help cloud security

Study: Adobe Flash cookies pose vexing privacy questions; SNARE, Gazelle, Vanish, Nemesis and Nozzle: sounds like quite the wild security conference
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Tripwire
rule

Secure Your Virtual and Physical IT Environments
Learn how integrity monitoring software solutions enable IT organizations to achieve and maintain configuration control. Tripwire(R) Enterprise is the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.

rule

Spotlight Story
VMware's purchase of SpringSource could help cloud security

VMware is buying SpringSource, an acquisition that promises to tighten the relationship between the virtual environment that cloud computing relies on and the applications that run in that environment. Read full story

Related News:

Study: Adobe Flash cookies pose vexing privacy questions
Adobe's Flash program is being used on heavily trafficked Web sites to collect information on how people navigate those sites even if people believe they've restricted the data collection, according to a new study.

SNARE, Gazelle, Vanish, Nemesis and Nozzle: sounds like quite the wild security conference

Whither the Cyber Security Coordinator?

Data breach suspect jailed before being caught
Don't know about you, but I'd have trouble sleeping tonight if I learned that my name and social security number were on a 64-page list of a thousand employees found stored -- of all places -- under a mattress. Tell me that mattress was in a prison cell and I'm staring bug-eyed at the ceiling all night.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


Black Hat's best
Black HatHow well you remember the Black Hat conference's most notorious incidents?

Wireless burning questions
IT quizHow much longer are you going to hang onto that Ethernet cable? And other questions.

Security Road Map: Best Practices, Tools
Discover how to recover from a data breach, gain compliance while saving money, and much more in this road map for regulatory compliance, breach avoidance and all-around solid security. Also learn the latest trends in network access control devices and data-leakage protection tools.
Download this Executive Guide now.


The necessary convergence of IT and Facilities
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives. That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.
The necessary convergence of IT and Facilities

 

August 12, 2009

TOP STORIES | MOST DUGG STORIES

  1. 10 worst video game systems of all time
  2. Five Reasons It's Time For a Verizon iPhone
  3. Five netbooks Microsoft has crushed
  4. Cash for IT clunkers?
  5. Do HP, 3Com value claims trump Cisco?
  6. Storage start-ups rethink data access
  7. Review: Cisco IPS 7.0 raises the bar
  8. Why Microsoft is sabotaging desktop virtualization
  9. Cyber attackers empty business accounts in minutes
  10. Five ways to get affordable certification skills

Data in Action: Effective data management for smarter outcomes
Date: August 19, 2009 Exhibit Zone 8:00 am PDT / 11:00 am EDT to 12:00 pm PDT / 3:00pm EDT Join us for a special, complimentary Virtual Conference, offering valuable information for lowering IT costs through industry-leading performance, enhanced storage compression and improved automation.
Data in Action: Effective data management for smarter outcomes



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: