Search This Blog

Monday, May 04, 2009

Cloud computing security: Who knew? Of subways, government subsidies and broadband

A couple of Twitter search services; The Kilo-Day threat and mundane security
Network World logo

Voices of Networking

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by Dell
rule

Performing a Virtualization Assessment
This animated tutorial outlines virtualization benefits, key features of Microsoft(r) Hyper-V(TM) virtualization technology available in Windows Server(r) 2008, and how Dell and Microsoft are working together on scalable and reliable virtualization solutions. It also provides a guide to assess your organization's virtualization readiness, using the Dell Virtualization Advisor tool.

rule

Spotlight Story
Cloud computing security: Who knew?

Scott Bradner By Scott Bradner
Security has not been much of a consideration in cloud computing --but that may be about to change. Read full story

Related News:

Eye on the Carriers: Of subways, government subsidies and broadband
There's a lot of talk these days of the "Internet as public utility." In fact, if you parse the language of the stimulus package, you definitely pick up that perspective as part of the motivation for investing $7.2 billion in Internet infrastructure.

Gearhead: A couple of Twitter search services
Mark Gibbs goes looking for other services that provide searching of Twitter Tweets and finds a couple that are really useful. In the process he also briefly reviews a book on tags.

Security: Risk and Reward: The Kilo-Day threat and mundane security
In the security business we spend a lot of time worrying about the "zero-day" threat that appears out of nowhere and immediately starts attacking a hereto unknown vulnerability.

Insider Threat: Identifying the source of corporate threats
The Verizon Business RISK team recently released its "2009 Data Breach Investigations Report" which gives a fresh look into the question of whether insiders or outsiders are the larger threat group. The report concludes that 74% of breaches result from external sources and "the predominance of total records lost was attributed to outsiders."

Small Business Tech: Solving problems graphically
Businesses, especially white collar businesses, are all about "processes and information" (thank you Michael Dortch). But what do you do when you find yourself looking at the same processes and the same information and can't improve your results? Try looking at things in a new way, graphically, using tools such as MindManager or TheBrain.

Backspin: Looking for swine and the data society
Mark Gibbs started by looking for swine flu data and wound up pondering the downsides of being an "information society" Could he be running a fever? Could he have "swine"?

'Net Buzz: Street View-style voyeurism stretches skyward
Arrive at the Gigapixel Photography Web site and you'll see a gorgeous photo of a dozen condominium towers stretched across the Vancouver skyline, yachts docked in the foreground, dusk bathing the scene in a rich blue hue.

Talking Tech: Lose your data, lose your business – What's behind door No. 3?
Disasters, by definition, strike with little or no warning. Whether it's an extended power outage, a devastating storm, or some other unforeseen disruption, the most nerve-wracking part of owning a business is the unknown. But good news: we can prepare effectively to weather even the worst of storms. A solid disaster recovery (DR) plan can mean the difference between a business bouncing back from a catastrophe or closing for good.

Cool Tools: Wireless photo frame with a twist
The Kaleido R7 digital photo frame, by IPEVO, lets you synchronize photos wirelessly from another computer on the same wireless network.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Performing a Virtualization Assessment
This animated tutorial outlines virtualization benefits, key features of Microsoft(r) Hyper-V(TM) virtualization technology available in Windows Server(r) 2008, and how Dell and Microsoft are working together on scalable and reliable virtualization solutions. It also provides a guide to assess your organization's virtualization readiness, using the Dell Virtualization Advisor tool.

rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

05/04/09

Today's most-read stories:

  1. New HP Networking boss took $17.2 million from EMC
  2. LaserJet turns 25 ... 'PC Load Letter' still unfathomable
  3. Is it time to cut the Ethernet access cable?
  4. Hacker: I broke into Twitter
  5. Some IT skills see pay hikes during downturn
  6. What kind of data center can you build with $500 million?
  7. 20 kick-ass network research projects
  8. Microsoft gives users Windows 7 free for 13 months
  9. Who's on deck to replace Cisco's Chambers?
  10. It takes a village idiot: The jerks of online forums
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: