Thursday, May 14, 2009

Who will check the security of cloud providers?

Network World logo

Cloud Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by NetApp
rule

How Safe Is Deduplication?
Deduplication is hot, but can you really count on it at restore time? Find out the two essential criteria for assessing the safety of the technology before you commit by downloading this article.

rule

Spotlight Story
Who will check the security of cloud providers?

Tim Greene By Tim Greene
The most basic facts about your data - like where it is exactly and how it is replicated - become difficult to find out when you entrust it to a cloud, a new study says. Read full story

Tim Greene is senior editor at Network World.

Related News:

Dark cloud computing
Cloud computing offers tremendous promise for the future of computing. In the cloud you will be able to link together remote computing resources to achieve massive amounts of computing without any of the capital infrastructure costs.

Microsoft's identity cloud platform enters Beta 2
Microsoft Monday released the Beta 2 of Geneva, its identity platform for the cloud, adding single sign-on capabilities across server applications and cloud-based services, and long-awaited support for SAML 2.0.

Cisco unveils cloud computing platform for service providers
Cisco this week is expected to unveil a platform for service providers that's designed to serve as a foundation for delivering cloud computing services.

DMTF aims to clear the fog of managing cloud computing
The Distributed Management Task Force (DMTF) recently announced the formation of an incubator dedicated to addressing the need for open management standards for cloud computing. The Open Cloud Standards Incubator will work to develop a set of informational specifications for cloud resource management. These specifications could lead to interoperability standards within twelve months.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by NetApp
rule

How Safe Is Deduplication?
Deduplication is hot, but can you really count on it at restore time? Find out the two essential criteria for assessing the safety of the technology before you commit by downloading this article.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

05/14/09

Today's most-read stories:

  1. Poster on Chinese forum leaks next-gen iPhone specs
  2. Too much experience could be hurting your IT job search
  3. Where the IT jobs are: 10 American cities
  4. Juniper ships 'cloud' switch
  5. Google ran out of bandwidth?
  6. PoE without the PoE switch
  7. Microsoft: Corporate Vista testers should switch to Win 7 RC
  8. Pirated Windows 7 software part of criminal botnet
  9. VidyoConferencing vs. videoconferencing
  10. Inside a data leak audit


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment