Search This Blog

Thursday, May 21, 2009

Credit card council looks into cloud security

Cloud computing: Pros and cons; Cloud-management wares multiply
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by IBM
rule

Dynamic Infrastructure Worldwide Virtual Forum, June 23
While at the Dynamic Infrastructure Worldwide Virtual Forum, you will hear from leading experts on today's IT challenges. Attend the interactive general sessions of your choice, visit product exhibits, get your questions answered and round out your experience by joining the live chat with experts.

rule

Spotlight Story
Credit card council looks into cloud security

Cloud security is enough of a potential problem that it's being investigated by the group that sets standards for protecting credit card data. Read full story

Related News:

Security group to consider wireless, virtualization standards for payment-card industry
The PCI Security Standards Council may address requirements related to the use of virtualization and wireless technologies by payment-card handlers.

Cloud computing: Pros and cons
Five reasons to embrace an external cloud and five reasons to stay away

Cloud-management wares multiply
Telemetry, NetIQ, ScienceLogic and Univa UD use Interop to debut products designed to manage performance and availability for IT services delivered via the cloud.

10 cloud computing companies to watch
Cloud computing is spreading through the IT world like wildfire, with innovative start-ups and established vendors alike clamoring for customer attention.

Why my company uses Amazon's EC2 cloud
The unpredictability of demand for the ShareThis link-sharing service and the need to minimize up-front costs are two reasons why the company decided to outsource its needs and use Amazon's Elastic Compute Cloud (EC2) service, says Nanda Kishore, CTO of ShareThis.

Security management, compliance and the cloud
SIM technology drew in enterprise security managers looking to reduce the noise among multiple security devices distributed in large environments, but lost some ground when IDS and IPS technology gained intelligence. Now cloud providers could get into the security management game.

Who will check the security of cloud providers?
The most basic facts about your data – like where it is exactly and how it is replicated – become difficult to find out when you entrust it to a cloud, a new study says.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.


Evolution of Ethernet
Evolution of EthernetFrom 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Beyond consolidation: five reasons why you should start virtualizing
Virtualization isn't just for large enterprises. Small and midsize businesses (SMBs) are finding that virtualizing servers can be a viable IT strategy. And although server consolidation is the primary reason many organizations are initially attracted to virtualization technology, it's hardly the only driver. Why else does it make sense for SMBs to virtualize? Here are five reasons from the experts—your IT peers and industry analysts.
Read this article today.


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09.
Select your city, register and attend free

 

May 21, 2009

TOP STORIES | MOST DUGG STORIES

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk

2009 Fave RavesNetwork World on Twitter: Get our tweets and stay plugged in to networking news

MOST-WATCHED VIDEO

  1. Notebook replaces trackpad with LCD panel

Global Visibility & Control at the Velocity of Business Change
The BigFix Unified Management Platform provides real-time visibility and control through a single infrastructure, single agent, and unified console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. BigFix has unparalleled scalability thanks to its distributed intelligence.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: