Friday, October 14, 2011

8 ways to become a cloud security expert

10 tech-centric MBA programs | Vint Cerf on Google's privacy practices and how getting tagged in a multitude of online media is disconcerting

Network World Compliance

Forward this to a Friend >>>


8 ways to become a cloud security expert
Information about how to securely navigate in the public clouds is, well, cloudy. We asked enterprise IT folks and IT consultants what resources they turned to get educated on this particular topic. The responses can loosely be broken down into three categories: niche conferences; big conferences, and authoritative voices accessible on the Internet. Read More


WHITE PAPER: HP

The People Side of Converged Infrastructure
IT is undergoing a massive shift. CIOs are looking for more flexible architectures that will allow them to quickly react to business needs. The Converged Infrastructure delivers the flexibility that CIOs need, with a high level of simplicity and automation that accelerates business outcomes while reducing costs. Read now

WHITE PAPER: Sophos

Seven Tips for Securing Mobile Workers
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. Read now

10 tech-centric MBA programs
See what kinds of IT classes MBA students can take to earn an IS concentration Read More

Vint Cerf on Google's privacy practices and how getting tagged in a multitude of online media is disconcerting
Few companies inspire the awe — and the dread about privacy concerns — that Google does, because of its search engine, Google maps and its Street View imagery, its Gmail e-mail and other cloud-based services. Read More

The SSL certificate industry can and should be replaced
The SSL certificate authorities like Comodo that have had their security undermined by hackers shouldn't be trusted, and in fact, the way the entire SSL certificate industry of today works can and should be replaced with something better, says Moxie Marlinspike, a security expert who's come up with a plan he says will do that. Read More

Father of SSL says despite attacks, the security linchpin has lots of life left
SSL/TLS, the protocol that protects security of e-commerce, has taken a beating lately, with news items ranging from the violation of certificate authorities to the discovery of an exploit that beats the protocol itself. Read More


WHITE PAPER: Trend Micro

Before Taking the Cloud Plunge
Security and privacy are critical concerns for those considering cloud adoption. The differences between SaaS, PaaS and IaaS are significant and require careful due diligence. This paper will help you do the homework necessary to compare security practices and determine which model is right for your organization. Read More

2011 tech industry graveyard
WebOS, Cisco Flip camera, Google Labs and the rest: Our list of IT companies, technologies and ideas killed off or headed for the end of life Read More

Raytheon's cyberchief describes 'Come to Jesus' moment
After Raytheon began selling missiles to Taiwan in 2006, the defense company's computer network came under a torrent of cyberattacks. Read More

Macworld: A conversation with Siri on the iPhone 4S
Macworld's Jason Snell talks with the iPhone 4S's new Siri technology. Read More

Dennis Ritchie, Father of Unix and C programming language, dead at 70
Dennis Ritchie, the software developer who brought the world the C programming language and Unix operating system, has died at the age of 70. Read More


WHITE PAPER: Akamai Technologies, Inc.

Akamai Cloud Optimization for Amazon EC2™
The emergence of public cloud platforms and services has IT organizations thinking about which applications they want to keep in-house and which they can build within the cloud. Read more

Sony suspends 93,000 online accounts after illicit logins
Sony has suspended 93,000 user accounts on several of its gaming and entertainment networks after unauthorized login attempts on those accounts, it said Wednesday. Read More

Man charged with hacking Scarlett Johansson, other celebs
A 35-year-old man was arrested Wednesday on charges that he broke into the email accounts of numerous Hollywood celebrities and stole private photographs and correspondence. Read More

Zero-day bugs overrated, Microsoft says
Microsoft advises that users don't panic when news breaks about the latest zero-day vulnerability, a flaw that hackers exploit before a software developer manages to patch the problem. Read More

RSA chief says two groups for SecurID breach
Six weeks after EMC's RSA security division saw its SecurID system hit by hackers, RSA president Tom Heiser met with the CIO of a large global medical device company. Read More



SLIDESHOWS

26 helpful open source network management tools
Over the last decade or so, open source development has skyrocketed, and network management software has ridden that wave. Many frustrated IT administrators have turned to free tools to monitor, configure and map their networked devices. Here are 26 examples of open source network management software tools to help you do your job.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. 2012 IT budgets, salaries on the rise, survey says
  2. Many users complain of broken iOS5 upgrade process
  3. BlackBerry CTO: No evidence a hack caused RIM outage
  4. Apple releases iOS 5; firmware features some 200 improvements
  5. Google engineer: 'We don't get platforms;' G+ 'pathetic'
  6. The SSL certificate industry can and should be replaced
  7. Don't weat zero-days and wise up stupid and lazy users
  8. 5 cloud security companies to watch
  9. Microsoft launches Firefox, Chrome attack campaign
  10. Michael Dell sends memo, of sorts, to HP

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment