How we tested security information management tools We brought all of the products into the production computing environment of a small multinational with six locations in five countries and ran them over the course of four months. Our environment consisted of a distributed range of devices including Linux machines (RedHat and SUSE), Microsoft Windows 2003 systems, VMware ESX servers, Cisco routers, switches (Cisco and HP), intrusion-detection systems, VPN devices (Cisco and Juniper), and firewalls (Cisco PIX and ASA models). PCI security standard gets flayed at House hearing The PCI standard, long touted as one of the private sector's best attempts to regulate itself on data security, is increasingly showing signs of coming apart at the seams. The legal implications of cloud security The legal implications of cloud security are wide ranging and potentially daunting - and there are no easy answers. Cloud security will supplant patching, says report author Patching alone will never solve the long-running headache of insecure software, the author of the influential Laws of Vulnerability 2.0 report has said. Eucalyptus cloud targets enterprise users The makers of Eucalyptus, the Linux-based open source cloud computing platform that now ships with Ubuntu, are targeting enterprise cloud computing with the launch of Eucalyptus Systems Inc. May Giveaways Cisco Subnet, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment