Thursday, May 14, 2009

Full encryption is the answer; Cloud security demands greater scrutiny than traditional IT outsourci

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by CDW
rule

Threat Control & Containment
A proactive approach can lead to more mobile network security plus peace of mind. In this timely whitepaper read how a security solution can be specifically geared to the mobile components of your network. Learn More!

rule

Spotlight Story
Full Disk Encryption Comes to Workgroups

James E. Gaskin By James E. Gaskin
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information. Read full story

Related News:

Cloud security demands greater scrutiny than traditional IT outsourcing
The security gaps in cloud computing demand greater scrutiny than traditional IT outsourcing models, a new Forrester report says. With traditional outsourcing models, a customer places its own servers in someone else's data center, or a service provider manages devices dedicated to that customer. But multi-tenancy rules the day in cloud computing, and customers may not know where their data is stored or how it's replicated, Forrester analyst Chenxi Wang writes in a report titled "How secure is your cloud?"

Microsoft "Geneva" could be genius but skeptics abound
Microsoft Subnet recently met with Brendan Foley, director of product management at Identity & Security Business Group, and asked him a few questions about Microsoft's Geneva.

Patch Tuesday: One critical patch for PowerPoint
Microsoft Subnet reports that Microsoft patched all Windows versions of Powerpoint today to address a client-side, zero-day flaw and 13 other privately reported security vulnerabilities, says Eric Schultze, Chief Technology Officer, Shavlik Technologies.

ASA information for CCNA security
Cisco Subnet blogger Michael Watkins shares some information about ASA appliances that could be useful if you are pursuing a CCNA Security certificate.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by CDW
rule

Threat Control & Containment
A proactive approach can lead to more mobile network security plus peace of mind. In this timely whitepaper read how a security solution can be specifically geared to the mobile components of your network. Learn More!

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/14/09

Today's most-read stories:

  1. Poster on Chinese forum leaks next-gen iPhone specs
  2. Too much experience could be hurting your IT job search
  3. Where the IT jobs are: 10 American cities
  4. Juniper ships 'cloud' switch
  5. Google ran out of bandwidth?
  6. PoE without the PoE switch
  7. Microsoft: Corporate Vista testers should switch to Win 7 RC
  8. Pirated Windows 7 software part of criminal botnet
  9. VidyoConferencing vs. videoconferencing
  10. Inside a data leak audit


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment