Tuesday, April 14, 2009

Cloud security guarantees?

What kind of security guarantees are there in the cloud?
Network World logo

Cloud Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Avaya
rule

Masters of Unified Communications
This interactive microsite is updated daily by Johna Till Johnson of Nemertes Research with all of the latest news on Unified Communications. Explore this site now to read the latest news on UC and download relevant whitepapers, case studies, videos, and more.

rule

Spotlight Story
Cloud security guarantees?

Tim Greene By Tim Greene
Cloud computing providers no doubt put forth a best effort to secure their infrastructure in order to protect their customers' data, but what kind of guarantees are there? Read full story

Tim Greene is senior editor at Network World.

Related News:

The consequences of inadequate cloud security The phenomenon of services in the cloud is well established. Some say it will become the dominant model for network infrastructure as issues of reliability and security are convincingly addressed.

Cloud Security Alliance formed to promote best practices A group calling itself the Cloud Security Alliance announced its formation Tuesday, with eBay and ING as founding members.

Podcast: Securing the cloud Newsmaker Chris Hoff will serve as technical advisor to the new Cloud Security Alliance. A security industry analyst and blogger, Hoff says the alliance will start by sorting out the fact from fiction related to the cloud. (12:13)

Cloud computing needs better security, interoperability to live up to hype If cloud computing is to move beyond the hype cycle, vendors need to put aside their differences and agree on common principles related to security and the interoperability of cloud platforms.

Cloud computing vendors converge on standard definition, goals Cloud computing vendors are moving toward a common definition and forming industry groups to collaborate on building cloud technologies.

Cloud computing is a scary proposition Mathias: I'm probably the biggest proponent of Web services/cloud computing/whatever on the planet, because such - in theory, anyway - is the ideal platform for mobile computing going forward. And yet, I'm troubled: there are enough holes in this concept at present to give even rabid supporters pause.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Avaya
rule

Masters of Unified Communications
This interactive microsite is updated daily by Johna Till Johnson of Nemertes Research with all of the latest news on Unified Communications. Explore this site now to read the latest news on UC and download relevant whitepapers, case studies, videos, and more.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/14/09

Today's most-read stories:

  1. Conficker awakens, starts scamming
  2. Microsoft eating up U.S. and global netbook markets
  3. Bill would give Obama power to shut down Internet
  4. Are you an IT geezer? (and we mean that in a good way)
  5. A Twitter virus shows up: StalkDaily
  6. The 10 worst Microsoft product names of all time
  7. Netbook computers spark corporate interest
  8. Conficker, the Internet's No.1 threat, gets an update
  9. The implications of Skype's free software application for iPhone
  10. Fear and loathing in Windows 7: Testing Branch Cache using Linux
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment