Monday, April 08, 2013

Let the hackers seek while you hide behind third-party hosted services

  How to Work With IT Recruiters to Find Top Tech Talent | How valuable are security certifications today?
 
  Network World IT Best Practices

Forward this to a Friend >>>


Let the hackers seek while you hide behind third-party hosted services
I recently had a conversation with the CISO of a small company that has a relatively large target on its back. This company hosts Web portals for its clients to accept electronic payments. For example, when you go to an online retailer's checkout process and get passed to a secure site, it's possible that this company is hosting that payment site. You can see how this kind of activity would make this company attractive to hackers looking for credit card information. Read More


WHITE PAPER: HP

Providing Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more.

WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

How to Work With IT Recruiters to Find Top Tech Talent
Searching for the best IT talent can feel like looking for a needle in a haystack, but using a headhunter can help swing the odds in your favor. Learn what it takes to get the most out of this symbiotic relationship. Read More

How valuable are security certifications today?
When it comes to education, most people agree, more is better. No one embodies that principle -- at least in regard to IT certifications -- better than Jerry Irvine. CIO of IT consulting firm Prescient Solutions and member of the National Cyber Security Task Force, Irvine holds more than 20 IT certifications, of which at least six are specifically information security-oriented. Read More


WHITE PAPER: IBM Corporation

Powerful Application Solutions for CRM & ERP
This white paper examines how you can get the most from CRM and ERP, find the best system for your business and how IBM can help. Learn More.

HortonWorks: The Hadoop company everyone wants to be best friends with now
During the past few years Neustar, an $830 million publicly-traded data analytics company, has undergone a dramatic business transformation, and it's been powered almost entirely by Hadoop. Read More

Airport's CIO Turns to Mobile App Helps Harried Travelers
Dallas-Fort Worth airport's smartphone app makes it easier for customers to find their gate, food and a parking place Read More


WHITE PAPER: Dell

Drive Business Results with Data that's Optimized Everywhere
When it comes to supporting growth and delivering new capabilities, The Dell Fluid Data architecture is designed to help you move faster and scale further than ever before while boosting resiliency. Learn how you can slash storage costs, increase agility and ensure applications are protected and available. Read Now

AWS takes aim at security conscious enterprises with new appliance
In a bid to improve data security, Amazon Web Services (AWS) has launched AWS CloudHSM, which uses a separate appliance to protect cryptographic keys used for encryption. Read More

Microsoft touts Office 365 wins, but customers want more
Microsoft is trumpeting Office 365 customer successes at its U.S. Public Sector CIO Summit on Tuesday, but some of those otherwise happy clients have a wish list of features and enhancements they'd like to see in the vendor's cloud email and collaboration suite. Read More

 
 
 

SLIDESHOWS

8 things you might not know about Android

Some lesser-known facts about Google's mobile OS.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. German court invalidates Apple slide-to-unlock patent

2. Google Grim Reaper: The latest killed projects

3. How that 'extra 9' could ward off Zombie Apocalypse

9. BlackBerry details extensive security protection in BlackBerry 10 OS

5. SIP trunking: The savings are there but the transition is complex

6. Microsoft's Patch Tuesday for April to address Windows 8 vulnerabilities

7. Windows 8: How to solve the Start Button dilemma

8. Cisco acquisition highlights interest in small cells

10. Amazon's biggest competitor in the cloud: Salesforce.com?

4. iPad 5 rumor rollup for the week ending April 3

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: