Wednesday, October 07, 2009

More views on cloud computing security

Nasty banking Trojan makes mules of victims; FBI says trio of terrorism e-mails are bunk
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Quest Software
rule

Free Virtual Event: Connect with Experts
Connect with experts like Jackson Shaw without leaving your computer! At Quest Connect, access white papers, demos and enjoy webcasts on topics like making single sign-on work in the real world and becoming friends with your identity and access management framework. Registration is free for this global event! October 21-22.

Click to continue

rule

Spotlight Story
More views on cloud computing security

I recently had the opportunity to speak with the two old-line purveyors of privileged user management software (also called Privileged Identity Management and Privileged Password Management) -- Cyber-Ark and e-DMZ Security. In separate phone conversations we covered most of the two companies' offerings and today we'll take a look at how they feel about cloud computing and authentication. Read full story

Related News:

Nasty banking Trojan makes mules of victims
A sophisticated Trojan horse program designed to empty bank accounts has a new trick up its sleeve: It lies to investigators about where the money is going.

FBI says trio of terrorism e-mails are bunk
The FBI today warned that three separate e-mails making the rounds that promise access to FBI terrorism reports are nothing more than malicious software looking to steal your personal information.   The three scam-mails are: 

Review: HP blade takes a stab at Cisco
HP has an alternative to the many security appliances that combine firewall, intrusion detection and VPN functions: Just put a single blade in the vendor's ProCurve switch and be done with it.

HP security blade scores impressive performance results for UDP traffic
Want to get the highest possible performance out of your security device? Make sure it only handles connectionless UDP traffic – the stuff that, according to studies from CAIDA and other sources – makes up less than 5 percent of traffic on Internet backbones.

Gmail, Yahoo Mail join Hotmail; passwords exposed
Google's Gmail and Yahoo's Mail were also hit by a large-scale phishing attack, perhaps the same one that snagged at least 10,000 passwords from Microsoft's Windows Live Hotmail.

Bitbucket's downtime is a cautionary cloud tale
Bitbucket's weekend troubles with Amazon's cloud services are instructive, but don't necessarily indicate a problem with cloud security.

After attacks, Adobe patches now come faster
Hackers like Adobe Systems, and now the company knows it all too well.

How to stop IT managers from going rogue
Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.
Register now.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 07, 2009

MOST-READ STORIES

  1. Pentagon: Our cloud is better than Google's
  2. For sale: Cisco data center rival Brocade
  3. Apple may take Woolworths to court over similar logo
  4. 10 seriously ridiculous hacks
  5. Cisco releases IOS 15.0
  6. Review: HP blade takes a stab at Cisco
  7. 15 genius algorithms that aren't boring
  8. 500 words too taxing? Does the 'T' in MIT stand for Tweet?
  9. Sprint likes multiple mobile operating systems
  10. Nortel could offload Metro Ethernet unit to Ciena

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment