Search This Blog

Wednesday, May 04, 2011

Caveat emptor in the cloud

How to be an effective security buyer | Hackers step up game, spread malware using Bin Laden bait

Network World Security: Identity Management

Forward this to a Friend >>>


Caveat emptor in the cloud
Just as I finished writing the last issue ("SCIMing the provisioning landscape") an interesting new study -- about cloud computing providers -- popped into my inbox. Read More


WHITE PAPER: IBM

An integrated approach to software asset management
Learn about cross-platform solutions that help IT organizations increase visibility into software inventory, and use activity and license entitlements to help control software costs and compliance risk. Read now

WHITE PAPER: Iron Mountain

Backup SaaS – What You Need to Know
Small and midsize businesses and organizations with remote offices can cost effectively improve their data protection strategy by employing an online server backup provider. This paper identifies the three major categories of server backup and recovery specialists to help you focus on the criteria and costs that will best fit your environment. Read Now!

How to be an effective security buyer
In previous columns I have repeatedly emphasized the importance of interoperability and the danger of security fragmentation. Security is so fragmented that it is often hard to discern between hype and reality. Read More

Hackers step up game, spread malware using Bin Laden bait
Hackers today stepped up their use of Osama Bin Laden's death by shoving malware into PCs when users fall for phony claims of photographs and video, security researchers said today. Read More

Air Force wants a long look at commercial spacecraft
The US Air Force is preparing to take a long look at how commercial space technology can help it better operate in the cosmos. The Air Force today said it will host a space test program meeting next week ahead of expected contract offerings, or Broad Agency Announcements looking to recruit commercial space providers. Read More


WHITE PAPER: Emerson Network Power

Taking the Enterprise Data Center into the Cloud
Get a detailed overview of cloud computing technology— common types of architectures and services and perceived risks impacting widespread adoption. Learn best practices for optimizing critical systems for cloud deployment in existing facilities and see how next-generation technologies forge a path toward an integrated DCIM approach. Learn More

How to disappear completely
In a world where we share more information online than ever before, it might seem impossible to disappear completely. But Frank Ahearn can help. A professional skip tracer for many years, he tracked down 'missing' persons for clients who were searching for them for legal or financial reasons. His arsenal included use of public records, credit reports, utility bills, criminal background checks, tax information and other revealing documents. Read More

US man pleads guilty to music piracy charges
A California man faces up to five years in prison on music piracy charges. Read More

10 Biggest High-Tech Cover-Ups: Shut Up and Act Like Nothing's Wrong
Like any industry, high tech has its share of scandals. But they are invariably made worse by companies that react to bad news by hoping no one will notice. As the saying goes, it's not the crime, it's the cover-up that kills you. Read More


WHITE PAPER: BMC Software

A Cost-Effective Solution for ITSM
If you're tired of the costly upgrades and difficult implementations other vendors put you through, BMC Remedy OnDemand offers an alternative. It can be implemented in days and significantly lower overall IT Service Management costs. Read the white paper to learn more about BMC Remedy OnDemand. Read More Today!

Home Wi-Fi Network Security: 4 Ways to Avoid Big Trouble
The risks of not properly securing your home wireless network continue to increase. Consider the newest tales from the dark side then follow four steps to stronger Wi-Fi network security. Read More

Can a new CISO improve Sony PlayStation Network security?
Can a chief information security officer (CISO) help prevent the kind of massive data breach that occurred in the Sony PlayStation network breach last month in which attackers grabbed personal information on an estimated 77 million customers of the PlayStation and Qriocity online games? Read More

Fake security software takes aim at Mac users
Scammers are distributing fake security software aimed at the Mac by taking advantage of the news that al-Qaeda leader Osama Bin Laden has been killed by U.S. forces, a security researcher said today. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Fave raves: 22 IT pros name their favorite products
We asked, and IT pros answered. Their favorite IT products keep people productive and enterprise assets safe. Check out the list.

MOST-READ STORIES

  1. VMware causes second outage while recovering from first
  2. Julian Assange: Facebook is a "spy machine" for U.S. intelligence
  3. Cloud computing providers: Clueless about security?
  4. IT consultant accidentally live blogs Bin Laden raid
  5. Juniper unveils first dedicated enterprise edge routers
  6. The week in iPhone 5 rumors
  7. Home Wi-Fi Network Security: 4 ways to avoid big trouble
  8. 25 geeky gifts for cool moms
  9. Cisco jumps into portable data center market
  10. Microsoft security expert warns over SharePoint data at risk

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: