Friday, March 19, 2010

Why is cloud computing hard? Top tech execs speak their minds

Seven Firefox Plug-ins That Improve Online Privacy | Hackers offered $100,000 for browser and phone exploits

Network World Compliance

Forward this to a Friend >>>


Why is cloud computing hard? Top tech execs speak their minds
Everyone's talking about cloud computing and security. But what makes it so hard? Execs at Microsoft, Trend Micro, EMC's RSA division, McAfee and Symantec tackle the question. Read More


RESOURCE COMPLIMENTS OF: IBM NWW


To improve the security of web applications, it starts by building software securely. IBM Rational AppScan is a suite of Web application vulnerability scanners that include dynamic and static analysis capabilities. Now you can engage more testers earlier in the development cycle. Download an evaluation copy of IBM Rational AppScan. Click to continue

WHITE PAPER: IBM NWW

Escaping PCI Purgatory
PCI compliance is a challenge for midsize and large companies alike, as there are four phases to meeting the PCI DSS requirements: assessment, remediation, compliance and maintenance. Read this white paper as IBM reveals five key 'sticking points' organizations have been facing on the path to PCI DSS compliance. Learn More

Seven Firefox Plug-ins That Improve Online Privacy
Worried about preserving your privacy in an online world where privacy is disappearing? Here are seven Firefox add-ons that will help. Read More

Hackers offered $100,000 for browser and phone exploits
Security company 3Com TippingPoint has jacked up to $100,000 (£65,000) the prize money on offer to anyone able to hack a range of browsers and mobile devices at the forthcoming CanSecWest security conference. Read More

Pushing for software quality assurance
In my experience, some programmers and program development managers resist investing time in software quality assurance (SQA). In a recent research article on "Resistance Factors in the Implementation of Software Process Improvement Project in Malaysia," from the Journal of Computer Science 4(3):211-219 (2008), the authors summarized extensive published research on why people resist SQA. Experts have found that there are several categories of stumbling blocks to integrating SQA into the software development process (Table 1, p 213): Read More

Cisco battered by large fall in security market
'Nobody fires you if you buy Cisco' it was once said but it seems somebody should tell the corporate security sector which has deserted the giant in droves in late 2009, new figures show. Read More


WHITE PAPER: Sunbelt Software

SMB's Should think Outside the Box to Protect Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec. Read Now

It does not take a village -- or a country
olumnist Scott Bradner says concerns of a "cyberwar" miss the main threat to network infrastructures. To date, essentially all cyberattacks where the perpetrators have been identified have been the work of small groups of individuals. Read More

FTC member rips into Google's privacy efforts
Several major U.S. Internet companies, including Google and Facebook, need to "step up" and better protect consumer privacy or face tougher penalties from the U.S. Federal Trade Commission, a commissioner said Wednesday. Read More

McAfee scans cloud environments for security vulnerabilities
McAfee's new vulnerability-assessment scanning service is aimed at giving cloud-computing service providers a way to provide security assurances to their customers. Read More

US military plotted revenge on Wikileaks
The US military was so fearful of classified information ending up on Wikileaks it considered ways to undermine the organisation, a newly published secret report on the site appears to show. Read More


WHITE PAPER: Polycom

Top Five Benefits of Video Conferencing
From obvious benefits, like reduced travel costs, to a few less apparent advantages, see what Polycom customers, resellers and industry analysts are saying about the power of video conferencing. Read More

Open source SSO lands in spotlight
Last week was a really big week -- perhaps the biggest ever -- for open source simplified signon in general and OpenID in particular. Read More

Security group preps IT shops to ask vendors 'nasty questions'
The Jericho Forum, which advocates improving e-commerce security through knowledge that network perimeters are fading, says organizations need to ask themselves and their vendors tougher questions. Read More

Humans continue to be 'weak link' in data security
Nearly 90 percent of IT workers in the UK have said a laptop in their organisation has been reported lost or stolen, new research has found. Read More

60% of virtual servers less secure than physical machines, Gartner says
Sixty percent of virtual servers are less secure than the physical servers they place, the analyst firm Gartner said in new research Monday. Read More

Microsoft hustles on IE patch, tests fix
Microsoft is testing a patch for a critical vulnerability in Internet Explorer, but stopped short of promising to deliver an emergency fix before the next scheduled Patch Tuesday. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. Corporate IT eager to deploy Windows 7, survey shows
  2. How to know if your iPhone battery is on death row
  3. New Cisco Ethernet switches to play a broader video, security roles
  4. Microsoft touts "browser with no name" in Windows Phone 7
  5. Google traffic starting to dominate Internet
  6. How 10 famous technology products got their names
  7. Which browser is more secure?
  8. Cisco CRS-3 to disrupt Hollywood?
  9. Cisco battered by large fall in security market
  10. Windows Phone 7: A sneak peek at the apps

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

  1. Anonymous8:31 AM

    І was moved еnough to poѕt a thought :-P I do haνе a сouplе of
    questions for yοu if you ԁon’t minԁ.

    Сould іt be only me or dο a few of the respοnseѕ appear аs if they are
    сoming from brain ԁeаd peοple?
    Αnd, іf yοu are pοstіng аt
    other sociаl sites, I ωould like to
    follow you. Could you liѕt the completе
    urlѕ оf youг social siteѕ like your tωitter feeԁ, Fаcebοoκ
    page oг linκedіn prοfile?

    Here іs my weblog :: core training exercise

    ReplyDelete