Search This Blog

Thursday, July 03, 2014

How to set up two-factor authentication for iCloud

10 CEOs who took drastic pay cuts | Gartner: Best practices for Amazon AWS security

Network World Cloud Computing

Forward this to a Friend >>>


How to set up two-factor authentication for iCloud
Two-factor authentication—called two-step verification in the Apple ecosystem—is a security system whereby you have to supply two things—instead of just a single password—to log in to an online (or other) service. Typically, those two factors are a password and a code that the service sends to your cell phone. Requiring those two factors, instead of just one, makes it a lot harder for online miscreants to pretend they're you. Read More


WHITE PAPER: OpenMarket

How CIOs Can Guide the Enterprise to Mobile Success
In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls. View Now>>

WHITE PAPER: Cobalt Data Centers

The Right Home for Your Systems and Data
Not all colocation providers offer the same value and functionality, and many come with inherent risks. When choosing a colocation provider, careful consideration is essential. Learn More

10 CEOs who took drastic pay cuts
Spectacular pay raises keep widening the gap between what CEOs earn and what average workers take home. But not all CEOs got a raise last year. Read More

Gartner: Best practices for Amazon AWS security
The Amazon AWS cloud service is fine for enterprise workloads and applying security controls such as encryption and firewalls is possible, though more security vendors need to step up to support Amazon's EC2 service, according to Gartner. Read More

Microsoft boosts anti-snooping protection in Outlook.com, OneDrive
Microsoft has added encryption safeguards to the Outlook.com webmail service and to the OneDrive cloud storage service, in part to better protect these consumer products from government snoops. Read More


WHITE PAPER: Box

Advantages of State-of-the-Art File Collaboration
Today's employees expect high levels of simplicity and transparency when it comes to their ability to upload, download, share and communicate. This white paper explains why IT must stop thinking about point solutions and start considering a system that encompasses multiple aspects of collaboration. Learn more

Netflix open sources its Amazon cloud security enforcer
Security Monkey keeps Netflix's cloud safe, and can do the same for yours. Read More

INSIDER
How-to: Get started with Docker
Docker is an open source framework that provides a lighter-weight type of virtualization, using Linux containers rather than virtual machines. Built on traditional Linux distributions such as Red Hat Enterprise Linux and Ubuntu, Docker lets you package applications and services as images that run in their own portable containers and can move between physical, virtual, and cloud foundations without requiring any modification. Read More

Microsoft Promises Frequent Office 365 Roadmap Updates
Frequent updates to cloud software can cause compatibility problems – which is why Microsoft has outlined plans to help your other applications play nicely with Office 365.Microsoft is ushering in a new era of openness about Office 365, its cloud-based productivity suite. Read More


WEBCAST: IBM

The Next Generation of Big Data
Learn about IBM's new and expanded Information Management capabilities now delivered in the cloud. Learn More

10 security start-ups to watch
Security start-ups arise because they have fresh approaches to fighting malware and cyber-espionage or combatting the insider threat through network monitoring. In this round-up of some of the newer security firms, Distil Networks, Observable Networks and Vectra Networks fit into that category. But two others just out of the gate, Exabeam and Fortscale, are part of another trend—squeezing more out of existing log management and security information and event management products. Read More

INSIDER
How to recover after a cloud computing misstep
DreamWorks Animation knows the magic of the cloud. Since 2003, the famed studio has held its product development, design and manufacturing functions in a hybrid cloud environment, long before the storage option was even called "cloud." Read More

Dropbox for Business folders can now be shared in read-only mode
Users of Dropbox for Business will now be able to share folders with colleagues without necessarily giving them rights to edit their content.Giving users read-only access to folders hasn't been possible until now: Dropbox for Business users by default granted edit rights to the people they shared the folders with. Read More

Google trumps Microsoft's 1TB of storage with unlimited space
Google today answered Microsoft's boost of cloud storage space by announcing it would give customers of its Google Apps for Business an unlimited amount of storage for an additional $5 per month per user. Read More


SLIDESHOWS

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 disturbing attacks at Black Hat USA 2014

2. FixIt giving away 15K iPhone 'liberation kits'

3. Tools catch security holes in open source code

4. Wzor's return brings Windows 9 rumors

5. 4 key features coming to Windows 9 (hopefully)

6. Google is killing off Orkut

7. 10 Bad Coding Practices That Wreck Software Development Projects

8. 10 security start-ups to watch

9. HP's giant Proliant challenges big iron from IBM, Oracle

10. Netflix open sources its Amazon cloud security enforcer


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: