Wednesday, June 10, 2009

Securing the cloud

The Borg lives: BBN gets $30 million for artificial intelligence wizard; Remove Sensitive Data Before You Sell an Old PC
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sun Microsystems
rule

PCI Compliance webinar
Identity and access management solutions are critical in establishing the necessary safeguards against malicious access to sensitive information. Our complimentary webinar explores how identity management can help address some of the key requirements of Payment Card Industry (PCI) Data Security Standard (DSS). Register now.

rule

Spotlight Story
Securing the cloud

Everyone these days seems to want to talk about "the cloud". Cloud computing is the latest buzz phrase that all vendors seem  to want to attach to their product. But, as I mentioned some weeks ago ("Identity management is key to the proper operation of cloud computing", proper identity management is often lacking in the rush to cloud-enable services and applications. While the Cloud Computing Manifesto (see that earlier newsletter) pays lip service to identity needs, what's actually happening in the marketplace? Read full story

Related News:

T-Mobile: Stolen network data genuine, but fear not
T-Mobile confirmed on Tuesday that internal information posted on the Internet by hackers was stolen from its systems, but said it does not appear customer data is in jeopardy.

The Borg lives: BBN gets $30 million for artificial intelligence wizard
Developing a an artificial intelligence system that can read, learn and develop knowledge about all manner of digital material in a quick, cost effective way sounds like a bit of a pipe dream.  But those are some of the lofty items that are now on BBN Technology's plate as the firm this week got $29.7 million from the Air Force to develop a prototype

Remove Sensitive Data Before You Sell an Old PC
Brian Ellis wants to know the best way to secure an old PC for a new owner.

Hidden threat on corporate nets: misconfigured gear
An invisible security weakness is lurking in most corporate networks in the form of millions of lines of code that represent the configuration scripts for all the devices on the network.

June Giveaways

Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.


Windows 7 + Windows Server 2008
Evolution of EthernetWe found 5 things to love and 5 things to hate about Microsoft's latest operating system versions.

Open-source management
Apple iPhoneys: The 4G editionHere are nine management apps that won't break the bank.

Reducing Data Center Energy Consumption
Learn how Emerson Network Power's Energy Logic, a vendor-neutral roadmap for optimizing data center energy efficiency, can deliver a 50% or greater reduction in energy consumption without compromising performance or availability.
Learn more.


 

June 10, 2009

TOP STORIES | MOST DUGG STORIES

  1. New DOS attacks threaten wireless data networks
  2. 2009's summer smartphone blockbusters
  3. Cisco's take on 4G: It's all about video
  4. Juniper claims first with 100G Ethernet
  5. CIOs: Your networks have already been compromised
  6. T-Mobile net reportedly hit by hacker/extortion attack
  7. Bing vs. Google vs. Yahoo: Feature smackdown
  8. FTC shuts down notorious ISP
  9. Five things we love/hate about Win 7/Windows Server 2008 R2
  10. Nvidia overcomes bad graphics chips

Effectively Secure your Distributed Enterprise
Is your security strategy diverse enough to thwart the growing threats against your network? Enterprise networks are more distributed which requires IT professionals to pull together a variety of tools to ensure all perimeters are protected. Discover how to minimize risk while keeping costs in check.
Learn more.



Inbox too cluttered?
Take our survey to help us improve how IT professionals get the information they need.
Click to take our survey


IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment