Tuesday, May 12, 2009

Cloud security demands greater scrutiny than traditional IT outsourcing, Forrester says

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

Spotlight Story
Cloud security demands greater scrutiny than traditional IT outsourcing, Forrester says

Jon Brodkin By Jon Brodkin
Cloud computing is gaining popularity, but raises new concerns about the safety of data. Read full story

Related News:

The feeling of greater security tempts us to be more reckless
The recent newsletter - rant, really - about the National Institute of Standards and Technology (NIST) white paper on enterprise password management ('Managing' passwords doesn't make them less unsafe) elicited a number of comments, some not very complimentary.

Most common data leak violations
With more than two decades of security audits under his belt, Networks Unlimited President Harry Segal has seen it all. Here are the most common violations he encounters. 

6 ways to protect your privacy on Google
Google provides many ways to protect your privacy online -- you just need to find them. Here are six good ones.

After defeating Microsoft in patent case, Uniloc looks to future
Uniloc, a small security company that won a $388 million patent infringement suit against Microsoft, expands into new markets


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

05/12/09

Today's most-read stories:

  1. Robot Fight Club
  2. The Internet sky really is falling
  3. Death of the mouse
  4. Bill would turn Internet flamers into felons
  5. Ubiquitous GPS coverage could soon get spotty
  6. Extreme, Force10 address growing 10G use in data centers
  7. Data center 10G whets switching companies' appetites
  8. Inside a data leak audit
  9. UC Berkeley says hacker broke into health-services databases
  10. Designing for high-density Wi-Fi coverage
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment