Search This Blog

Monday, November 08, 2010

A hazy view of cloud security

Rival calls foul over Microsoft's delivering Security Essentials via Windows Update | Don't be an application bigot

Network World Security: Identity Management

Forward this to a Friend >>>


A hazy view of cloud security
A recent survey of 384 business managers from large enterprises revealed that confusion abounds about cloud data security. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: CA

The Value of Service-Centric Visibility
IT organizations are under pressure to avert problems before they occur. To achieve the proactive approach required and move to the next level of service delivery, they need "service-centric" visibility that ties infrastructure components to the services that rely on them. Read More

Rival calls foul over Microsoft's delivering Security Essentials via Windows Update
Microsoft this week began offering U.S. customers its free antivirus program via Windows' built-in update service, a move one major security firm said may be anticompetitive. Read More

Don't be an application bigot
Many security decisions and acceptable use policies are based on a false categorization of applications. "Business applications" are good, safe and have business value. "Personal applications" are bad, unsafe and have no business value. Read More


WHITE PAPER: Hitachi

Be the Change: Discover the 3D Scaling Advantage
Imagine a platform that can scale up to provide improved performance and throughput as its host servers consolidate, scale out to deliver capacity, performance and bandwidth from a shared pool of resources as more and more host servers are connected to it, and scale deep by connecting external storage. Read Now

EU tests cyberwarfare defences in low-key simulation
States across Europe have today carried out the region's first ever cyber-attack 'desk simulation' designed to find weak spots in the way government organisations might behave if faced with the real thing. Read More

Microsoft: Cloud services hampered by unclear data rules
The patchwork of rules across Europe regarding the handling of data poses a hurdle for Microsoft's efforts to provide cloud-based services, a senior Microsoft attorney said on Thursday. Read More


WEBCAST: Emerson Network Power

Hands-on DC management shouldn't give you paper cuts
This webcast demonstrates how field-proven Avocent MergePoint® Infrastructure Explorer software is already providing substantial ROI for data centers up to 500 racks. Its dynamic, graphic interface gives a deep view of your data center to help you more efficiently plan changes, lower operating costs, and deliver on-target capacity planning. Watch Now.

USB devices play part in one out of every eight attacks
One out of every eight computer attacks is being made via USB devices targeting the Windows AutoRun function, according to security software firm Avast. Read More

Protect your photo rights online
A big part of the joy of photography is sharing your images with others. The Internet has made it easy to instantly show your shots to friends, family, and even people you don't know. Many photographers post their work to Facebook, Flickr, Picasa, photography forums, or their own blogs and websites. Read More

Privacy advocates fear massive fed health database
Privacy groups have raised alarms over plans by the federal Office of Personnel Management to build a database that would contain information about the healthcare claims of millions of Americans. Read More

Google quashes 12 Chrome bugs, gives users early Flash fix
Google today patched 12 vulnerabilities in its Chrome browser, all of them rated as high-level threats by the company's security team. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Excited iFixit strips down Microsoft's Kinect game controller
  2. Researcher to release Web-based Android attack
  3. Microsoft patents 'record button on a computer system'
  4. All Windows 7 customers should consider desktop virtualization
  5. Microsoft warns of new Zero-day attack affecting IE 6,7,8
  6. Cisco rolls out social network monitoring software
  7. The 'kill switch' for Windows Phone 7 apps
  8. Network resolutions: Why aren't Cisco software updates free?
  9. Rival calls foul over Security Essentials delivered via Windows Update
  10. The 25 worst high-tech habits (and how to fix them)

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: