Search This Blog

Thursday, September 17, 2009

Fed cloud plan is wisely tempered by security concerns

VMware completes purchase of Java vendor SpringSource; What can be done to ensure online privacy?
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by Oracle
rule

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.

Register for this Live Event now.

rule

Spotlight Story
Fed cloud plan is wisely tempered by security concerns

The federal CIO is pushing for government use of cloud services immediately, and the way he is going about it can teach a lesson to businesses struggling with how to use these services securely. Read full story

Related News:

VMware completes purchase of Java vendor SpringSource
VMware has completed its acquisition of enterprise Java vendor SpringSource, a $362 million deal designed to help customers build, run and manage applications to be run on cloud-based platforms.

What can be done to ensure online privacy?
The Federal Trade Commission is looking into how online information can be protected better, including personal data available through social networking, cloud computing, online behavioral advertising, mobile marketing, and the collection and use of information by retailers, data brokers and third-party applications.

Will government gig put Google ahead of Microsoft in cloud race?
With Google set to bring Google Apps to U.S. government agencies next year, analysts say it's a move that could put the search giant a step ahead of rival Microsoft - and give the cloud a boost at the same time.

Cloud security through control vs.ownership
Cloud computing makes auditors cringe because it not only breaks the links between hardware and software via virtualization, it also makes the physical location of data irrelevant and even obscure.

Unpatched Applications Are Top Cyber Security Risk
Unpatched client software and vulnerable Internet-facing web sites are the most serious cyber security risks for business. Lesser threats include operating system holes and a rising number of zero-day vulnerabilities, according to a new study.

Is social networking a tool for more secure ID management?
At Digital ID World 2009, a Facebook platform engineer says social networking sites can be used to actually improve identity and access management. Why wasn't he laughed off stage by the skeptical security crowd before him? Read on.

A security disaster is averted by financial firm's quick action
New York City-based investment firm Maxim Group, faced a security ordeal this year when a virus outbreak pummeled the company's Windows-based desktop computers and servers.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Gartner Predicts 2009: Recession Accelerated Shifts in IT Services
Recessions have the powerful effect of accelerating shifts in the market. The need to lower cost, increase efficiency and conserve cash has increased the motivation of companies to turn to outsourcing and increased the appeal of alternative delivery models. The disruptive shifts in new demand and supply patterns will drive changes for how IT services are bought and from whom. Gartner's Strategic Planning Assumptions for the IT services market will help buyers and sellers plan their strategies.
Learn more, click here.


Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.

 

September 17, 2009

TOP STORIES | MOST DUGG STORIES

  1. Microsoft greasing Win 7 skids with early release of desktop tools
  2. Domain-name abuse proliferates
  3. Windows 7 touch: Dead on arrival
  4. Sprint CEO calls the iPhone the "Michael Jordan" of smartphones
  5. IEEE stamps "approved" on 802.11n Wi-Fi standard
  6. Developer denies software to beat Chinese censors is malicious
  7. Avaya wins Nortel enterprise business for $900 million
  8. A tale of two college Wi-Fi networks and 802.11n
  9. 10 cool Web apps developed in two days
  10. Ethernet switch vendors propose data center collapse

Integrated Data Mgmt: Strategies for Success
Together, a data integration platform and an ICC can save your company millions of dollars. Download this white paper to find out how T. Rowe Price reused skills, process, best practices to reduce development and support costs by $2.2 million over five years.
Click here.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: