Thursday, April 16, 2009

Can a cloud be more secure than a corporate data center?

The Jericho Forum releasing its spin on the security of cloud computing
Network World logo

Cloud Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Enhance performance, security, and stability
By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their servers.

rule

Spotlight Story
Can a cloud be more secure than a corporate data center?

Tim Greene By Tim Greene
The Jericho Forum next week plans to release its spin on the security of cloud computing with the perhaps surprising belief that using a cloud can actually be more secure than running applications and databases out of corporate data centers. Read full story

Tim Greene is senior editor at Network World.

Related News:

The future of network security Enterprise connectivity is exploding, driven by globalization, convergence, virtualization and social computing. As corporate perimeters dissolve, the security focus switches towards application and data-level security solutions. The question to ask is what are the longer-term implications for network security? Will it become redundant or could it grow more powerful? Only one thing seems certain: It will be different from today.

Jericho Forum: Visionaries with a visibility problem Now in its forth year, the Jericho Forum has held the course in its role as a user forum advocating security alternatives to the perimeter firewall, arguing for its vision of "de-perimeterization" in an Internet- ...

Moving to a safer social place -- together Jeroen Willemsen, researcher at Capgemini, a member of the Jericho Forum, discusses the "collaboration-oriented architecture."

Managing trust in our digital world In this month's piece, John Arnold, chief security architect at Capgemini UK, discusses the Jericho Forum's concepts of online trust and collaboration-oriented architecture. The Forum is an organization dedicated to ...

Trend Micro dishes out security smorgasbord Trend Micro Monday dished out a smorgasbord of endpoint security products that put the focus on Trend's cloud-based architecture and its partnership with systems-management vendor BigFix.

Cloud security guarantees? Cloud computing providers no doubt put forth a best effort to secure their infrastructure in order to protect their customers' data, but what kind of guarantees are there?

Identity management is key to the proper operation of cloud computing One of the hot buttons, or buzz phrases, these days is "cloud computing." Boiled down, it's just like client-server computing except: a) you don't own the server; b) you don't know where the server really is; and c) you ...

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Dell
rule

Enhance performance, security, and stability
By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their servers.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/16/09

Today's most-read stories:

  1. NASA takes Ethernet deeper into space
  2. EBay to spin off Skype by mid-2010
  3. Microsoft's Patch Tuesday filled with zero-day exploits
  4. Fact-checking the fact-checkers: Snopes.com gets an 'A'
  5. Managing IP addresses with free tools
  6. Exchange 2010: Sneak peek
  7. Breakthrough enables Terabit Ethernet
  8. 15 nifty BlackBerry apps for IT pros
  9. Exchange 2010 beta leads kickoff of new Office lineup
  10. Recession resistant: 10 technologies CIOs are still buying
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment