Tuesday, April 28, 2009

The Cloud Security Alliance looks to standardize security for cloud computing

CSA releases an 83-page document detailing 15 areas of concern for cloud-computing security
Network World logo

Cloud Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Simplifying the Data Center
Dell provides a fully engineered, end-to-end, holistic virtualization solution that includes hardware, services and support for Windows Server 2008 with Hyper-V. Read this white paper to find out how the Dell virtualization solution is both cost-effective and easy to manage, and it ensures high availability with enterprise performance and stability.

rule

Spotlight Story
The Cloud Security Alliance looks to standardize security for cloud computing

Tim Greene By Tim Greene
A wide ranging group has set down principles for cloud security and is seeking help advancing them. Read full story

Tim Greene is senior editor at Network World.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Are security issues delaying adoption of cloud computing? "Yes, security is one of the concerns about cloud computing that is delaying its adoption," says Eric Mandel, CEO of managed hosting services provider BlackMesh in Herndon, Va. "One of the biggest security concerns about cloud computing is that when you move your information into the cloud, you lose control of it. The cloud gives you access to the data, but you have no way of ensuring no one else has access to the data. How can you protect yourself from a security breach somewhere else in the cloud?"
Also see: Seven burning security questions

Cloud security stokes concerns at RSA Two words — cloud security — dominated discussion and drove the action this week at RSA Conference 2009.

Cloud computing security: Who knew? Cloud computing is big even though there is less than perfect agreement on just what it is. As a measure of success, Google gets more than 25 million hits for the term "cloud computing". If you add "security" to the search you still get 20 million hits, but a lot of the hits turn out to be articles focusing on the security issues with cloud computing.

Cisco's Chambers: Cloud computing a 'security nightmare' Cisco CEO John Chambers painted a less-than-sunny view on cloud computing security at RSA, saying that "it can't be handled in traditional ways."

Cloud computing a 'security nightmare,' says Cisco CEO If anyone has the right to be excited about cloud computing, it's John Chambers. But on Wednesday Cisco's Chairman and CEO conceded that the computing industry's move to sell pay-as-you-go computing cycles available as a service on the Internet was also "a security nightmare."

McKinsey Cloud Computing Report Conclusions Don't Add Up McKinsey, the doyen of strategy consultants, published a report on cloud computing last week featuring a disguised real-world case study. While the report doesn't explicitly state the fact, it seems that the paper is a summary of the results of a strategy project with a financial services firm, which apparently engaged McKinsey to assess whether it would make sense to move all of its systems to Amazon Web Services.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Simplifying the Data Center
Dell provides a fully engineered, end-to-end, holistic virtualization solution that includes hardware, services and support for Windows Server 2008 with Hyper-V. Read this white paper to find out how the Dell virtualization solution is both cost-effective and easy to manage, and it ensures high availability with enterprise performance and stability.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/28/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Seven burning security questions
  3. The downfall of Sun
  4. The legal risks of ethical hacking
  5. Conficker.E to self-destruct on May 5th?
  6. Researchers show how to take control of Windows 7
  7. Einstein systems to inspect U.S. government's Internet traffic
  8. The evolution of Ethernet
  9. The biggest losers in the Oracle, Sun deal
  10. Intel CPU cache poisoning: dangerously easy on Linux
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment