Friday, November 04, 2011

Godfather of Xen: Virtualization holds a key to public-cloud security

The 33 hottest tech arguments | Corporate-owned vs. employee-owned mobile devices

Network World Security

Forward this to a Friend >>>


Godfather of Xen: Virtualization holds a key to public-cloud security
While conventional wisdom says virtualized environments and public clouds create massive security headaches, the godfather of Xen, Simon Crosby, says virtualization actually holds a key to better security. Read More


RESOURCE COMPLIMENTS OF: Network World

The Critical Path to IPv6: December 13 in New York
With IPv4 addresses rapidly depleting, transitioning to IPv6 is necessary. Attend The Critical Path to IPv6 and gain practical insights and best practices for getting started with IPv6, planning address assignments, avoiding pitfalls, and more. Learn from industry experts, interactive panels and breakout sessions. Complimentary admission. Learn More

WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

The 33 hottest tech arguments
Network World and IDG News Service have assembled this collection of primers examining today's most explosive and intriguing networking and IT issues, from vendor rivalries to product battles to technology trends. Read More

Corporate-owned vs. employee-owned mobile devices
If an employee walked into work one day clutching his shiny new iPhone, iPad, Android or other mobile smartphone or tablet, wanting to use it for official corporate business, would you say yes? Read More

Virtualization vs. Native apps
About a year ago, a few of the larger virtualization software vendors, such as VMware and CA Technologies, started campaigning against a phenomena that they called virtual stall. Read More


WHITE PAPER: PhoneFactor

Phones Become the Leading Multi-Factor Authentication Device
According to a leading analyst firm phone-based authentication will comprise 61% of the multi-factor authentication market by the year 2014. This paper will address the key drivers for this market shift away from security tokens and includes real-world case studies from organizations that have made the move to phone-based authentication. Read now

IBM illuminates solar power system aimed at data centers
IBM said today that is rolling out a solar-power array system designed to run high-voltage data centers. IBM has installed the first iteration of the system on the 6,000 square-feet of rooftop of its India Software Lab in Bangalore. The solar array is capable of providing a 50-kilowatt supply of electricity for up to 330 days a year, for an average of five hours a day. Read More

Simulated cyberattack unites EU and US security experts
Almost 100 computer experts from 16 European countries jointly battled to hold off serious cyber attacks on the European Union's security agencies and power plants as part of a simulated exercise on Thursday. Read More

Romanian eBay hacker and prosecutor both unhappy with appeal ruling
Romanian eBay hacker Vlad Duiculescu, known online as "Vladuz," lost the appeal to get his three-year suspended prison sentence reduced on Tuesday. The court also dismissed the appeal lodged by prosecutors regarding the hacker's acquittal on organized crime charges. Read More


WHITE PAPER: Oracle

The Application Grid Approach to a Modern Data Center
An application grid approach significantly automates the process of adding, reducing, or modifying existing IT deployments in support of highly scalable systems that have less downtime and lower resource consumption. Learn More!

US report warns of Russia, China cyber spying
The U.S. can expect more aggressive efforts from countries such as Russia and China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing, according to a new government report released Thursday. Read More

Bloodiest tech industry layoffs of 2011
Job cuts in the U.S. technology industry in 2011 are down significantly from a year ago and turnover levels in IT shops have returned to pre-recessionary levels, but that doesn't make the tens of thousands of people in the United States who have been laid off from electronics, telecommunications and computer industry jobs feel much better. Read More

Study: IT's future lies with cloud computing, security and mobile
Cloud computing, security and the mobile space hold the most growth potential in the coming years, according to IT professionals surveyed by tech staffing firm Modis. Read More

Holiday shopping with personal devices at work could pose security risk
Workers plan to do more online holiday shopping this year while on the job, with many using their own smartphones and tablets. That's got IT managers worried, a survey shows. Insider (registration required) Read More

Microsoft expected to offer hot fix for Duqu soon
The big zero-day exploit on everyone's mind is Duqu, or "son of Stuxnet" - but researchers don't expect Microsoft to include a patch for it in next week's Patch Tuesday. Instead, a manual fix could be out as soon as this week. Read More



SLIDESHOWS

Security Industry All-Stars
Welcome to the Security All-Stars! Here we have assembled our list of top players in information security who year after year demonstrate the specialized skills that make them worth listening to.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Fabric wars: Cisco vs. Brocade vs. Juniper
  2. Gartner: 10 key IT trends for 2012
  3. Stallman parody site catches Stallman's attention
  4. Network World's 33 hottest tech arguments
  5. Cisco vs. HP vs. IBM vs. Dell
  6. U.S. energy agency demos blazingly fast network
  7. Virtualization wars: VMware vs. Hyper-V vs. XenServer vs. KVM
  8. Wikipedia commissions study to measure accuracy of Wikipedia
  9. Browser wars: IE vs. Firefox vs. Chrome vs. Safari vs. Opera
  10. Coolest tech-o-lanterns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment