Search This Blog

Wednesday, October 06, 2010

Cloud security stays hot

Research project aims to simplify large-scale network control | Microsoft's Live@edu email not encrypted on cloud servers

Network World Security: Identity Management

Forward this to a Friend >>>


Cloud security stays hot
We can't seem to get away from talking about identity and cloud computing, but that does seem to be the "hot topic" for at least the rest of this year. So hot, in fact, that we can begin to speak of various identity niches within the whole cloud computing/software-as-a-service environment. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WEBCAST: NeuStar, Inc.

30 Minutes to Faster Web Pages
Join this discussion and learn the importance and nuances of load testing, measuring scalability, setting page performance and transaction response rates, and what to do when things go wrong. You'll even hear performance improvement tips that are quick to implement and free. View Now

Research project aims to simplify large-scale network control
Network control project touted by Google, Nicira and NEC under the International Computer Science Institute (ICSI) and UC Berkeley Simplifying large scale network environments is a complex task but one that a number of researchers and vendors are trying to undertake. This week researchers from Google, Nicira Networks and NEC under the guise of the International Computer Science Institute (ICSI) at UC Berkeley will present a research project at this week's Read More

Microsoft's Live@edu email not encrypted on cloud servers
Thousands of universities, and millions of people, are turning to Microsoft Live@edu for cloud applications. But Live@edu "enhanced privacy and security features" do not include encrypting email on servers. Microsoft promises that its free Live@edu e-mail and collaboration tool is better than the rest because it still meets a university's security and "privacy" needs. But it appears to be missing one critical step in doing so -- encrypting data stored on servers. Read More

'Political' cyberattacks hit half of large companies
When asked if their enterprises had been hit by "politically minded attacks" that could include terrorist or state-sponsored cyberattacks aimed at stealing sensitive inform or bringing down the network, half of the IT managers at 1,580 enterprises worldwide answered they thought that had happened to them. Read More


WHITE PAPER: Akamai Technologies

Electronic Software Delivery
IDC : Those that are focused on providing an exceptional software acquisition are increasingly utilizing technology that helps create and measure a positive user experience. In this IDC whitepaper, review the benefits and processes of electronic software delivery. Learn the components of a successful solution that is optimal to the end user. Learn more

Cisco launches high-end security appliance
Cisco today announced a multi-function security appliance that combines a firewall with VPN support, plus an intrusion-prevention system (IPS), to reach speeds up to 20 Gbps with 10,000 VPN connections and 350,000 connections per second. Read More

White House set to nail up solar panels
White House to get solar panels, hot water heaterThe White House gets s lot of heat and it is about to take advantage of some of it. With a nod toward the green effort, the US Department of Energy said it plans to install solar panels and a solar hot water heater on the roof of the White House residence. Read More

Fake browser warnings dupe users into downloading 'scareware'
Scammers are spoofing the anti-malware warnings of popular browsers to dupe Windows users into downloading fake security software, according to Symantec. Read More


WHITE PAPER: APC by Schneider Electric

Virtualization: Optimized Power and Cooling
Data centers are routinely and unknowingly missing a great portion of their entitlement from virtualization. Beyond virtualization's undisputed IT benefits – from reduced rack footprint to disaster recovery – is the parallel story of a substantial benefit from optimizing the physical infrastructure that supports it. Learn more >>

Cloud computing in the U.S. shows momentum
How widespread is business use of cloud computing? The results of one survey published Tuesday suggest use of both public and private clouds has real momentum in the United States, with private cloud computing appearing to be more popular. Read More

Piracy group threatens more DDoS attacks
The self-styled campaigners who launched DDoS attacks on a range of prominent copyright and anti-piracy organisations last week has threatened further attacks in an interview with security company, Panda Security. Read More

Symantec Unveils Strategy to Protect Mobile Devices and Data
Recognizing that the technology landscape is shifting rapidly toward mobility, Symantec today unveiled new tools to help protect mobile devices, and the sensitive data they contain. The mobile security and management strategy from Symantec enables businesses, service providers, and users to manage and secure mobile devices no matter where they may roam. Read More

PCI security group speaks out on encryption
The organization in charge of defining security for the payment-card industry's merchants and service providers Tuesday issued two guidance papers, the first on end-to-end encryption and the second on payment card technology used more commonly in Europe than the United States. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. How Treasury, AT&T botched billion-dollar network upgrade
  2. BoA is holding my online bank accounts hostage
  3. Microsoft IE browser share dips below 50%; Google Chrome rises
  4. Can large scale NAT save IPv4?
  5. Free desktop tools that aren't OpenOffice
  6. 'Toasted skin syndrome' may be the least of their troubles
  7. The 17 most dangerous places on the Web
  8. BlackBerry backup encryption broken by Russians
  9. Toshiba's no-glasses 3D TV: How it looks
  10. Microsoft making 'first mover' Windows Phone 7 apps developers a priority

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: