Security group to consider wireless, virtualization standards for payment-card industry The PCI Security Standards Council may address requirements related to the use of virtualization and wireless technologies by payment-card handlers. Cloud computing: Pros and cons Five reasons to embrace an external cloud and five reasons to stay away Cloud-management wares multiply Telemetry, NetIQ, ScienceLogic and Univa UD use Interop to debut products designed to manage performance and availability for IT services delivered via the cloud. 10 cloud computing companies to watch Cloud computing is spreading through the IT world like wildfire, with innovative start-ups and established vendors alike clamoring for customer attention. Why my company uses Amazon's EC2 cloud The unpredictability of demand for the ShareThis link-sharing service and the need to minimize up-front costs are two reasons why the company decided to outsource its needs and use Amazon's Elastic Compute Cloud (EC2) service, says Nanda Kishore, CTO of ShareThis. Security management, compliance and the cloud SIM technology drew in enterprise security managers looking to reduce the noise among multiple security devices distributed in large environments, but lost some ground when IDS and IPS technology gained intelligence. Now cloud providers could get into the security management game. Who will check the security of cloud providers? The most basic facts about your data like where it is exactly and how it is replicated become difficult to find out when you entrust it to a cloud, a new study says. May Giveaways Cisco Subnet, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31. |
No comments:
Post a Comment