Friday, June 08, 2012

Securing mixed cloud environments

The Fallout from eHarmony's Password Leak and New Details on LinkedIn's Fiasco | Berners-Lee, MIT's Clark offer glimpses into the future of the Internet

Network World Security

Forward this to a Friend >>>


Securing mixed cloud environments
Securing cloud computing environments is challenging enough, but is made all the more complicated when a mix of cloud options are employed, an approach that will become increasingly common. Read More


WHITE PAPER: Oracle

Best Practices for Exadata Cell
This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data. Learn more.

WHITE PAPER: Teradata

Cloud Computing Models for Data Warehousing
Gain better business intelligence through private cloud self service capabilities. In this whitepaper, analyst Mark Madsen explores why private cloud computing is a better choice to meet your analytical needs as business conditions fluctuate and grow. Learn more.

The Fallout from eHarmony's Password Leak and New Details on LinkedIn's Fiasco
Since an estimated 8 million combined LinkedIn and eHarmony passwords were dumped into a user forum notorious for password cracking, the internet has exploded with speculation, investigation, advice and occasional hilarity. Blackmail Read More

Berners-Lee, MIT's Clark offer glimpses into the future of the Internet
Sir Tim Berners-Lee, speaking at the American Academy of Arts and Sciences in Cambridge, Mass., Tuesday night with MIT Senior Research Scientist David Clark, said that participation in the information society must be regarded as a right, not a privilege. Read More


WHITE PAPER: Fluke Networks

How to Choose a Datacenter OTDR
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

DARPA wants electronics with radically novel liquid cooling technology
With increased electronic minituriztion and the density of the chips running such devices heat is a mortal enemy for the power and scalability of such systems. Read More

The Information Security 80/20 Rule
Over the past few months, I've been engaged in a research project on enterprise security management and operations. As part of some quantitative research, ESG created a segmentation model that divided survey respondent organizations into three sub-segments. The segmentation model broke down as follows: Read More


WHITE PAPER: EMC Corporation

Easing the Transition to a Virtual Endpoint Infrastructure
This Technology Spotlight discusses the drivers, benefits, and challenges of creating virtual desktop environments, and looks at the role EMC Global Services plays in helping companies achieve successful deployments of this important technology. Learn More

Could insurance coverage hobble commercial space flights?
Should the government continue to share the monetary risk of a catastrophic spacecraft accident even as the United States depends ever-more on commercial space technology? Read More

Stuxnet details leaked to boost Obama, alleges McCain
The Obama administration is deliberately leaking information on US cyber-attacks against Iran in order to portray itself in a favourable light to voters, Senator John McCain has alleged. Read More

LinkedIn Hack FAQ: What You Need To Know
LinkedIn users awoke to a nasty surprise today as word spread that hackers breached LinkedIn's servers and leaked passwords for nearly 6.5 million user accounts. LinkedIn didn't acknowledge the hack until midday Wednesday afternoon, when the company finally confirmed that a certain number of member passwords had indeed been compromised. Read More

Microsoft's reaction to Flame shows seriousness of 'Holy Grail' hack
Microsoft appears to agree with experts that the exploit of its Windows Update system by the Flame cyber espionage malware was a "significant" event in the history of Windows hacking. Read More



SLIDESHOWS

Why the Internet needs IPv6
Explosive growth of Internet users, devices, apps creates demand for more IP addresses.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Gartner: Top 10 emerging infrastructure trends
  2. How to determine if your LinkedIn password has been compromised
  3. Gartner: Cloud-based mobile device management (MDM) getting hot
  4. Dept. of Homeland Security to focus on cyber workforce development
  5. LinkedIn confirms breach, urges members to change compromised passwords
  6. Retelling a Password Nightmare in the Wake of the LinkedIn Password Leak
  7. The life of a 'booth babe': high heels, long hours and leering visitors
  8. HP's policy on politics: 'Do as we say, not as Meg does'
  9. What to expect in Apple's upcoming Maps app
  10. Many 'name' sites sitting out today's World IPv6 Launch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment