Friday, October 02, 2009

5 Mistakes a Security Vendor Made in the Cloud; Applying the science of persuasion to security awareness

Applying the science of persuasion to security awareness; Defining Cloud Security: Six Perspectives
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Courion Corporation
rule

Improve Compliance by Integrating Security and Identity
Download a this white paper by Jon Oltsik, Principal Analyst at Enterprise Strategy Group (ESG) explaining how RSA, The Security Division of EMC, and Courion integrate their best-of-breed identity and security technologies in order to meet the compliance needs of demanding enterprise customers.

Click to continue

rule

Spotlight Story
5 Mistakes a Security Vendor Made in the Cloud

Here's the cautionary tale of how one security vendor went astray in the computing cloud, and what customers can learn from it. (Part 3 in a series) Read full story

Related News:

Applying the science of persuasion to security awareness
Do you ever wonder whether all those security-awareness posters, coffee mugs, pens, mouse pads, and sandwich-bag clips are having any effect at all to improve security?

Defining Cloud Security: Six Perspectives
Cloud computing is all the rage these days, but confusion abounds over how best to secure it. Here, six IT security practitioners share their ideas on the key components of a cloud defense (part of an ongoing series).

U.S. Homeland Security wants to hire 1,000 cybersecurity experts
The Department of Homeland Security is looking to hire 1,000 cybersecurity professionals in the next three years according to the agency's secretary Janet Napolitano.

Security researchers ask: Does self-destructing data really vanish?
Researchers this week published a paper describing how they broke Vanish, a secure communications system prototype out of the University of Washington that generated lots of buzz when introduced over the summer for its ability to make data self-destruct.

Wi-Fi group launches full 11n certification
The Wi-Fi Alliance is launching a certification program based on the completed IEEE 802.11n standard on Wednesday and looking toward a future peer-to-peer specification it is developing on its own.

Facebook CAPTCHA no match for spyware attack
Hackers have found a way to create automated Facebook pages and are using them to spread spyware to unsuspecting users, says antivirus and Internet security firm AVG Technologies.

FBI warns of social networking fraud, malware escalation
Fraudsters are targeting social networking sites with increased frequency and users need to take precautions, the FBI warned.

Amazon EC2 is booming; keep an eye on cloud security
Here's a fascinating analysis of just how much business Amazon's EC2 cloud services has. It's worth a read.

Microsoft wary as security, identity integration plan lags
Microsoft is on the verge of finally providing some pieces of software to back up its ambitious plan to integrate its security and identity technologies, but the company admits it is moving slower than it had anticipated.

Data breach hits payroll firm PayChoice
Hackers breached the systems of payroll processor PayChoice, the company confirmed.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Improve Compliance by Integrating Security and Identity
Download a this white paper by Jon Oltsik, Principal Analyst at Enterprise Strategy Group (ESG) explaining how RSA, The Security Division of EMC, and Courion integrate their best-of-breed identity and security technologies in order to meet the compliance needs of demanding enterprise customers.
Click to continue


 

October 02, 2009

MOST-READ STORIES

  1. The dark side of DLP
  2. Five reasons to dive into Google Wave
  3. Cisco to buy videoconferencing vendor Tandberg for $3B
  4. Oracle throws a party, taxpayers pick up tab
  5. Twins Lars and Jens Rasmussen invented Google Wave
  6. Half of iPhone owners would drop AT&T like a bad habit
  7. The mobile phone: A history in pictures
  8. Juniper is about to make a strategic blunder
  9. Microsoft's Ballmer finds wallet a little lighter
  10. Top Microsoft execs outline 2010 challenges

BeyondTrust PowerBroker: Root Access Risk Control for the Enterprise
Compliance efforts and security concerns have driven businesses to make substantial investments in threat control. In this paper, EMA analysts examine BeyondTrust PowerBroker, a comprehensive solution designed to close these gaps for the enterprise with provable control.
Read More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: