Tuesday, May 29, 2012

Gartner: Don't trust cloud provider to protect your corporate assets

Bug bounty hunters reveal eight vulnerabilities in Google services | IaaS: Renting on-demand technology

Network World Cloud Computing

Forward this to a Friend >>>


Gartner: Don't trust cloud provider to protect your corporate assets
When a family with a baby buys a new car, they don't buy a car seat from the vehicle manufacturer: There is specialized equipment to handle the family's most sensitive asset. John Pescatore, a Gartner vice president and security analyst, says cloud security can be thought of in a similar way: Users shouldn't rely on their cloud service provider's security features to protect their most critical data. Read More


WHITE PAPER: Dell

Data Center and Private Cloud Solutions
By progressively transforming your data center, you can turn it into a highly-optimized private cloud that maximizes efficiency, security, and agility, while providing elastic scalability and always-on availability. Learn More

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

Your IT Career Roadmap
This unique session is designed with you, the IT professional in mind. How can you build your personal brand, and properly design a career plan? How do you work with your staff to create a plan that retains your best talent? Come to IT Roadmap Denver for valuable information on how today's IT leaders build successful careers. Click to continue

Bug bounty hunters reveal eight vulnerabilities in Google services
Security researchers unveiled eight vulnerabilities in Google services during the Hack in the Box conference in Amsterdam -- but they claim to have discovered more than 100 such bugs over the past few months. Read More

INSIDER
IaaS: Renting on-demand technology
Putting your faith in the cloud can be a risky endeavor. A survey from earlier this year showed that of 600 large companies, only 27% were using public cloud Infrastructure-as-a-Service. Read More

Obama orders agencies to optimize Web content for mobile
U.S. President Barack Obama has ordered all major government agencies to make two key services available on mobile phones within a year, in an effort to embrace a growing trend toward Web surfing on mobile devices. Read More


WHITE PAPER: Teradata

Cloud Computing Models for Data Warehousing
Gain better business intelligence through private cloud self service capabilities. In this whitepaper, analyst Mark Madsen explores why private cloud computing is a better choice to meet your analytical needs as business conditions fluctuate and grow. Learn more.

Box to beef up IT administration features of cloud content management software
Box will start letting customers test a new set of IT administration controls for its cloud-hosted enterprise collaboration and content management software. Read More

Customizable cloud SLAs on the way, researchers predict
Service-level agreements and legal standards for cloud offerings will become more customized to individual customers and vertical industries as the cloud market continues to mature and providers look for ways to differentiate their offerings, researchers at the University of London predict. Read More

8 ways to customize Windows 8
The Consumer Preview of Windows 8 -- which was made available to the public to download, install, and use for free until the new Microsoft OS is officially released -- has its share of the good and not-so-good. Fortunately, you can tweak various things to make it work the way you like, particularly if you're not fond of its radically new Metro UI. Read More


WHITE PAPER: Extreme Networks

Delivering a Greener Data Center
This paper covers power utilization, intelligent power management and industry best practices for energy efficiency. Extreme Networks® takes a lifecycle approach to power efficiency, management and recycling, offering savings to our customers and promoting a greener world. Learn more.

Information of U.S. federal employees exposed
A hack in July last year of a computer used by third-party services provider Serco to support the Thrift Savings Plan run by the U.S. Federal Retirement Thrift Investment Board resulted in unauthorized access to the personal information of about 123,201 TSP participants and payees, FRTIB said Friday. Read More

9 great open-source media apps
No proprietary license? No problem. Read More

WAN virtualization's benefits "beyond the WAN" for security, cloud computing
Last time, we covered the network benefits of WAN virtualization. Here, we look at how WAN virtualization delivers benefits "beyond the WAN" to the security and computing sides of the enterprise IT shop. Read More



SLIDESHOWS

Whose high-tech exec job hinges on the presidential election?
There are a ton of high-tech managers and regulators in the federalgovernment who may be changing jobs come November.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Windows Phone 8, or 'Apollo,' debuts next month at San Francisco conference
  2. Extreme BYOD: When consumer tech goes to unexpected places
  3. iPhone display rumors galore
  4. Supercomputer to connect to 400PB of storage via Ethernet
  5. Tech's $20 million CEOs
  6. Sales of unused IPv4 addresses gathering steam
  7. Groups launch gigabit-per-second broadband project
  8. 9 warning signs of bad IT architecture
  9. Google warns users infected with DNSCharger as Web outage nears
  10. Tech managers aren't doing a good job developing IT talent

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cloud_computing_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment