Thursday, October 27, 2011

Cloud security: Mission impossible

How to rob a bank: A social engineering walkthrough | Researchers find "massive" security flaws in cloud architectures

Network World Security

Forward this to a Friend >>>


Cloud security: Mission impossible
The term "cloud" connotes things floating around freely – which is not something you necessarily want your data doing. That is the common perception of cloud computing today, leaving many leery about trusting that their business-critical information is safe despite no clear security in place. Read More


RESOURCE COMPLIMENTS OF: Cisco Systems

Context-Aware Security for BYOD Trend
Concerned about the "Bring Your Own Device" (BYOD) trend? Although an "Any Device" environment is becoming essential for today's workplace, new risks and problems may result if your infrastructure isn't ready. Join IDC's Chris Christiansen and Cisco Systems as they discuss security architecture and solutions to address challenges for BYOD. Register Now

WHITE PAPER: HP

Securing Virtualized Data Centers
Understand the real need for security solutions that can address the reality of expanding virtualization. You will also learn how HP TippingPoint's secure virtualization framework allows organizations to gain control of the virtual environment by introducing in-line security policy enforcement. Read Now

How to rob a bank: A social engineering walkthrough
If a company hires us for a social engineering engagement, typically they want us to get in and get to their back-up tapes, or into the data in their document room. Read More

Researchers find "massive" security flaws in cloud architectures
German researchers say they found flaws in Amazon Web Services that they believe exist in many cloud architectures and enable attackers to gain administrative rights and to gain access to all user data. Read More


WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

NASA: "Interplanetary bogeyman" comet Elenin is no more; it's an ex-comet
NASA, which had gone out of its way to diminish wild doomsday reports about the impact of comet Elanin on Earth over the summer, reiterated its scorn for the hoopla by today issuing a statement detailing the comet's death. "Comet Elenin is no more," NASA said. Read More

US to fund aggressive technology that cuts solar power costs 75%
The US Department of Energy wants researchers and scientists to "think outside the box" and come up "highly disruptive Concentrating Solar Power technologies that will meet 6¢/kWh cost targets by the end of the decade." Read More


WHITE PAPER: BMC

Seven Standards of Cloud Computing Service Delivery
This paper outlines best practices for selecting cloud-computing solutions. Learn more!

China detains Internet users for spreading rumors
Chinese authorities have started to detain Internet users for allegedly spreading online rumors, in its latest measure to control the country's social media sites. Read More

Japan foreign offices, parliament hit by virus attack
Computers at Japan's diplomatic offices abroad and its House of Representatives were infected by viruses during cyberattacks over the last several months, the country's top spokesman said. Read More

Computer analysis, online translator, intelligent guesses crack ancient German code
The encrypted initiation rite of an ancient German secret society preoccupied with ophthalmology has fallen to modern language analysis tools including an online automatic translator. Read More

Japanese defense contractor admits hackers may have snatched secrets
Japan's largest defense contractor backpedaled yesterday, saying it's possible some secrets had been stolen by hackers who broke into the company's network and planted malware in August. Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Microsoft's YouTube channel gets hijacked and wiped clean
  2. Happy 10th birthday, Windows XP, now please die
  3. 5 tech pros companies want to hire
  4. Open source: You know, for kids!
  5. Gartner: Private clouds are a last resort
  6. A BlackBerry user's first impressions of his new iPhone 4S
  7. Week 1: Ubuntu Unity instead of Windows 7 and ready to scream
  8. Double security whammy: Killer SSL DDoS attack, XML encryption broken
  9. After the iPod, ex-Apple engineers built world's coolest thermostat
  10. Wi-Fi devices crowd 2.4GHz band; IT looks to 5GHz

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment