Tuesday, June 02, 2009

Can cloud services become credit-card botnets?

Lanco adopts cloud-based URL and security service; Is the cloud reliable enough for your business?
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by Villanova University Online
rule

Save money, increase quality, speed
By incorporating Lean and Six Sigma, project managers are better equipped to ask the right questions and get the right answers, improving quality, customer service and cost. Discover how these management tools can minimize waste in your organization and streamline operations.

rule

Spotlight Story
Can cloud services become credit-card botnets?

Attackers have used public cloud computing infrastructure to lay the groundwork for attacks, a security researcher has found based on consulting with his business customers. Read full story

Related News:

Ubuntu Server: Lean, mean, cloud-making machine
Ubuntu Server is a fast, free, no-frills Linux distribution that fills a niche between utilitarian Debian and the GUI-driven and, some would argue, over-featured Novell SUSE and Red Hat Enterprise Linux.

Lanco adopts cloud-based URL and security service
In order to keep employees from accessing inappropriate Web sites, Lanco International used to enter the URLs of some banned sites into its Internet Security and Acceleration server filters, but that was a cumbersome process that didn't nearly cover the vast number of inappropriate sites.

Is the cloud reliable enough for your business?
In April of last year, Satoshi Nakajima, founder of Washington-based Big Canvas Inc., was eagerly inviting new customers to subscribe to his company's flagship product, PhotoShare, which lets users swap Apple iPhone photos for free.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Network World Executive Guide: Governance and Risk Management
Read this road map for regulatory compliance, breach avoidance and all around good security. Highlights include the nightmare of a security breach, compliance problems, tools, strategies and best practices from security pros.
Read More Now


 

June 02, 2009

TOP STORIES | MOST DUGG STORIES

  1. Nine management apps that won't bust your budget
  2. The rise of personal 'Mi-Fi' hotspots
  3. Windows 7 alluring, but XP is the migration factor
  4. YouTube hit by porn storm
  5. 20 years after Tiananmen, China containing dissent online
  6. Ubuntu Desktop: Plenty of sizzle, not much steak
  7. Microsoft warns of DirectX attack on XP, WS2003 in the wild
  8. Bing: A visual tour of what's new
  9. Obama announces new cybersecurity direction
  10. Top four tips to fight off botnet denial-of-service attack

Holistic Approach to Business Security
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs, and see how IBM enterprise security can optimize business results.
Holistic Approach to Business Security



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment