Tuesday, March 26, 2013

Who has responsibility for cloud security? A Network World roundtable

  CIA Chief advises you to ask: What are your rights? Who owns your data? | Straight talk on security gets employees to listen -- and comply
 
  Network World Security

Forward this to a Friend >>>


Who has responsibility for cloud security? A Network World roundtable
As more organizations leverage the cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts. Highly regulated business and government organizations in particular must maintain comprehensive security and compliance postures across these hybrid systems. Network World explores the issue in-depth with: Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

WHITE PAPER: HP

Rethinking Your Enterprise Security
Forward-thinking enterprises realize they need to focus on a sustainable approach to security and risk management—one that is designed to address the new wave of vulnerabilities that prevail due to increasing trends in IT consumerization, mobility, social media, cloud computing, cyber crime, and nation-state attacks. Learn more.

CIA Chief advises you to ask: What are your rights? Who owns your data?
The cloud is old news, it's "so three years ago," and Big Data "was so last year," but according to the CIA's Chief Technology Officer, Ira "Gus" Hunt, this year is about "how to get value" from Big Data. At the GigaOM Structure Data conference, Hunt presented, "The CIA's 'Grand Challenges" with Big Data" and I highly recommend that you take about 30 minutes to personally listen to it. Read More

Straight talk on security gets employees to listen -- and comply
Sure, you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Hackers steal photos, turn Wi-Fi cameras into remote surveillance device
With so many people seizing the convenience of using their smartphone cameras to point, shoot and share, embedded GPS location and all, digital camera manufacturers have been offering more "social" options such as built-in Wi-Fi capabilities and camera apps to quickly share photos and videos. Read More

Entrust puts down stake in the future of mobile security and digital certificates
Entrust, whose focus is identity-based security based on digital certificates, has come up with new ways its technology can play a role in mobile devices. According to Entrust CEO Bill Conner, the latest thing is putting a digital certificate in an Apple iPhone so it can be used to wirelessly sign in to a PC or Macintosh. Read More


WHITE PAPER: Verisign Inc.

Combining Cloud-Based DNS & DDOS Protection Services
First published in SC Magazine, this article discusses the threat of Distributed Denial of Service (DDoS), Domain Name System (DNS) as a common attack vector for DDoS, and makes the case for combined, cloud-based DNS and DDoS protection services to thwart the risks of DDoS. Learn more.

Security experts applaud Apple's new two-factor authentication
Apple this week followed the lead of rivals like Facebook, Google and Microsoft, offering two-step authentication to help customers secure their Apple IDs against hacking. Read More

A NEW architecture for enterprise Internet access
Last time, we looked at a specific solution to the problem of the "trombone" effect in enterprise Internet access using the Read More

 
 
 

SLIDESHOWS

The Goog-father: Google's big shakeup isn't personal ... just business

Today, Google takes care of all family business.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending March 15

2. Juniper to unveil programmable core switch for software-defined networking

3. Kali Linux: The Next BackTrack

9. Hackers steal photo, turn Wi-Fi camera into remote surveillance device

5. DoD accepts CompTIA's Advanced Security Practitioner certification

6. Where do Cisco's network security plans go from here?

7. New BlackBerry smartphones could mean complex enterprise server installs

8. 15 of the App Store's most bizarre offerings

10. Progress report: Building and managing the 21st century data center

4. 9 classic hacking, phishing and social engineering lies

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment