Tuesday, July 19, 2011

Can you comply with court orders for data from the cloud?

Network World Security Strategies - Newsletter - networkworld.com
Pentagon unveils five steps for better cybersecurity | 7 high-tech programs that want to pick your brain

Network World Security Strategies

Forward this to a Friend >>>


Can you comply with court orders for data from the cloud?
The very nature of cloud storage, and one of its selling points, is that the cloud is dynamic. You only use what you need and shut down what you don't. Read More


WHITE PAPER: BMC

Deliver Workload Automation Services to Business Users
Workload automation touches every aspect of the business. It is made up of all scheduled and ad hoc processes that support critical business functions. Read More!

WHITE PAPER: Kaseya

Why Corporations Need to Automate IT Systems Management
In today's competitive business environment, corporations across all industries are looking to provide quality products and services while at the same time cutting costs, saving energy and doing more with less. Automated IT systems management is the ultimate facilitator for achieving these goals…and more. Read now

Pentagon unveils five steps for better cybersecurity
The U.S. Department of Defense goes public with its strategy for cyberspace. Read More

7 high-tech programs that want to pick your brain
With increasing frequency it seems agencies of the government are looking to tap into the public conscienceness to gather information on everything from how you surf the Web to how they can use information generated by you to predict the future. It's all a little creepy, really. Here we take a look at seven programs announced this year that in some cases really want to crawl into your brain to see what's happening in the world. Read More

Researcher finds dangerous vulnerability in Skype
A security consultant has notified Skype of a cross-site scripting flaw that could be used to change the password on someone's account, according to details posted online. Read More


WHITE PAPER: Emerson Network Power

Ten Steps to Increasing Data Center Efficiency
You can't manage what you don't monitor. That's why infrastructure monitoring is essential to data center optimization. Emerson Network Power outlines what you should be monitoring, how to monitor it and the results you can expect. Take the proactive approach to infrastructure monitoring. Read now

Botnet Called 'Practically Indestructible'
A new and improved botnet that has infected 4.5 million Windows PCs is "practically indestructible," security researchers say. Read More

Outgoing federal CIO warns of 'an IT cartel'
In a wide-ranging discussion Friday with President Barack Obama's top science advisors, Federal CIO Vivek Kundra warned of the dangers of open data access and complained of "an IT cartel" of vendors. Read More

Anonymous takes aim at Google+ in more ways than one
Google+ may be getting some attention it doesn't want -- from Anonymous, which says it will target the new social networking site that launched last month. Read More


WHITE PAPER: Riverbed

Case Study - Psomas
As a high-growth firm, Psomas needed to accelerate application performance to accommodate a changing set of demands from the business as well as employees. With Riverbed Steelhead products deployed worldwide, their employees can now share work and leverage resources wherever they happen to be. Read now!

Apple iOS 4.3.4 security fix jailbroken overnight
Apple's iOS 4.3.4 PDF vulnerability fix issued Friday didn't stymie jailbreakers for long -- a beta jailbreak tool for the mobile software update was released on Saturday. Read More

Security Manager's Journal: The perils of enterprise search
I'm a big fan of search. The ability to use the Internet to cull information on virtually any topic with just a few clicks has made me more efficient and better informed. And "information" can come in the form of pictures, documents, videos, news feeds -- whatever you need. Read More

US military learning cybersecurity lessons from businesses
In its new cyberdefense strategy, the Pentagon is drawing on lessons about agility, lifecycle management and supply-chain protection that have already been learned by private corporations. Read More

Imagine: Massively scalable multi-core security
Desktops and servers are being transformed by virtualization and multi-core CPUs, but that effect is a bit harder to see in security. Multi-core CPUs especially hold the possibility of completely transforming how and where we do security. One of the effects is to shift more of the security functions into the network. Another may be to radically change the software architecture within and across security appliances. Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from the Subnets: Cisco Subnet: 15 copies of IPv6 for Enterprise Networks books. Enter here.

SLIDESHOWS

10 HP TouchPad apps for newbies
HP took the wraps off its shiny new webOS-based tablet - the TouchPad - on July 1. And like the Apple iPad, the Motorola Xoom and the BlackBerry PlayBook, this tablet debuts with a pack of applications customized for the tablet form factor.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. Getting at the real truth about IPv6
  3. The horror of blue LEDs!
  4. The best of 'Damn you, autocorrect'
  5. 10 hard truths IT must learn to accept
  6. Can Sprint realistically support both LTE and WiMAX?
  7. Cisco injects new life into Catalyst 6500 switch
  8. The next WiFi: Is your 802.11n installation already obsolete?
  9. 7 high-tech programs that want to pick your brain
  10. New Cisco switch delivers 60 watts to the desktop

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_strategies_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment