Tuesday, May 05, 2009

The legal implications of cloud security

No easy answers to the legal implications of cloud security
Network World logo

Cloud Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Spotlight Story
The legal implications of cloud security

Tim Greene By Tim Greene
The legal implications of cloud security are wide ranging and potentially daunting - and there are no easy answers. Read full story

Tim Greene is senior editor at Network World.

Related News:

Verification of cloud security Verification of cloud security is difficult but also important so businesses need to figure out the best way to handle this.

The Cloud Security Alliance looks to standardize security for cloud computing A wide ranging group has set down principles for cloud security and is seeking help advancing them.

Group proposes cloud management standard DMTF creates new group dubbed the Open Cloud Standards Incubator, which will be dedicated to addressing the need for open management standards for cloud computing.

Cloud computing security: Who knew? Bradner: Security has not been much of a consideration in cloud computing - but that may be about to change.

Cloud Standards: Trickier than Nailing Jell-O to a Wall Just try creating a definition of cloud computing that's broad enough to encompass all its permutations and narrow enough to provide technical guidance on how to get one cloud talking to another.

Security promises in the cloud A survey released this week at RSA is troubling in that it says businesses using cloud services are concerned about security, but don't verify what providers do to meet the security promises they make.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

05/05/09

Today's most-read stories:

  1. Illinois programmer sues Google over "Android"
  2. Why mix Bluetooth with Wi-Fi?
  3. Use the Cisco restroom at your own risk
  4. Is it time to cut the Ethernet access cable?
  5. Some IT skills see pay hikes during downturn
  6. Juniper bolsters branch router, switch lines
  7. LexisNexis says its data was used by fraudsters
  8. Who's on deck to replace Cisco's Chambers?
  9. Microsoft aligning management, clouds
  10. Eliminate network gear maintenance fees to save big money
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: