Search This Blog

Monday, November 05, 2012

The Cloud Security Alliance provides guidance for SIEMs in the cloud

  How One Business Uses Social Networking and BPM to Handle Disasters | Ernst & Young's IT security survey shows struggle to control cloud computing, social media and mobile risks
 
  Network World IT Best Practices

Forward this to a Friend >>>


The Cloud Security Alliance provides guidance for SIEMs in the cloud
The Cloud Security Alliance has developed a guidance document to help organizations evaluate cloud-based implementations of security applications, including information on evaluating and implementing Security Information and Event Management (SIEM) systems in the cloud. Read More


WHITE PAPER: Condusiv Technologies (formerly Diskeeper Corporation)

Optimize Your Storage Volume for Better Performance
Managing a windows network? This brief discusses 5 technical proof-points clearly showing how the Windows Built-in Disk Defragmenter is not adequate for the enterprise. New innovations in Diskeeper® and V-locity® meet today's demands for optimal storage and system performance. Read Now!

WHITE PAPER: Symantec

The CIO's Guide to Building an MDM Strategy
The incredible success of mobile communications is plain to see. Anywhere you go people are on mobile devices. This trend has helped drive the evolution of the enterprise computing platform from fixed PCs to mobile devices. Read Now!

How One Business Uses Social Networking and BPM to Handle Disasters
Brian Flynn, CIO at Crawford & Company, an insurance claims outsourcer, knew that the company's processes needed updating when he saw in person how its catastrophe team operated during an emergency. Read More


WHITE PAPER: EMC Corporation

Modernize Backup to Accelerate the Journey to Virtualization
Backup and recovery processes can be modernized simultaneously with a company's journey to virtualization. In this paper, IDC examines the solutions and explains how they speed the benefits of virtualization while modernizing the backup and recovery process. Learn more.

Ernst & Young's IT security survey shows struggle to control cloud computing, social media and mobile risks
Many CIOS and chief information security officers are struggling to adapt security practices to a changing environment that includes cloud computing, social media and tablets , according to a survey of 1,850 such IT pros. Read More


WHITE PAPER: Cisco

Networking and Cloud: An Era of Change
The rise of cloud models brings with it new infrastructure, applications, access policies, and traffic patterns. Learn how networks must adapt to keep up with the demands of the cloud, and find out how Cisco is leading the charge. Read Now

Hackers, Security Pros Talk Penetration Testing, Social Engineering
CIO.com goes undercover (sort of) at GrrCon, the Midwest's premier conference on penetration testing and software security, to learn about cloud security, hacking, lock picking and more. Read More

Algorithm predicts Twitter 'trending' topics hours in advance
Twitter's "trending" feature is a guilty pleasure of mine, I will confess. Read More

20 must-know Windows 8 tips and tricks
Windows 8 is rife with features and behaviors that conspire to perplex even the most experienced PC users. Not all of them are bad, per se, but few of them are immediately intuitive. Making matters worse, the OS was primarily designed for touch control, and as a result, many mouse and keyboard commands feel like tacked-on afterthoughts. Read More

 
 
 

SLIDESHOWS

First look: Windows 8 Surface RT
Surface RT, the Microsoft-built tablet/notebook, offers a sleek design and sturdy feel.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. FTC escalates anti-robocall campaign -- takes out five mass callers
  2. 10 signs it may be time to quit your job
  3. Drama in NYC as data center temp passes 100 degrees
  4. Microsoft renames former Metro apps to 'Windows 8 Store' then 'Windows Store' apps
  5. Cisco's new management system simplifies control of thousands of servers
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. Stolen cell phone database switched on in U.S.
  9. 12 effective habits of indispensable IT pros
  10. Apple's online apology to Samsung not sufficient, says UK court
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: