Search This Blog

Friday, August 28, 2009

Password Protection Policy; When the compliance officer comes calling … hide the VMotion

Compliance Alert - Newsletter - NetworkWorld.com
Password Protection Policy; When the compliance officer comes calling … hide the VMotion
Network World logo

Compliance Alert

NetworkWorld.com | Update Your Profile


Sponsored by Courion Corporation
rule

Webinar: ITIL and Access Assurance
View an on-demand webinar with Courion: ITIL and Access Assurance View this webinar and learn how leveraging best practices of Information Technology Infrastructure Library (ITIL) can support your strategy for ensuring that only the right people have the right access to the right resources and are doing the right things.

Click to continue

rule

Spotlight Story
Unmasking DLP: The Data Security Survival Guide

You've heard from all the vendors who claim to have just the thing for your DLP needs. But how do you know what's best for your company's particular security needs? In this series, CSOonline talks to IT security practitioners, vendors and analysts about what is and isn't true DLP. Read full story

Related News:

Password Protection Policy
Overview

When the compliance officer comes calling … hide the VMotion
So for the time being let's set aside some of those pesky security consideration - hypervisor attacks, VM sprawl, etc and focus on VMotion. VMotion is used to move VMs from one ESX Server to another ESX Server while still maintaining uptime (basically the end user has absolutely no idea their backend VM is re-locating to another ESX server). The primary reasoning for this is ESX maintenance. ...

#2 of x: Compliance Officer on the floor…HIDE the VMotion!
So for the time being let's set aside some of those pesky security consideration - hypervisor attacks, VM sprawl, etc and focus on VMotion. VMotion is used to move VMs from one ESX Server to another ESX Server while still maintaining uptime (basically the end user has absolutely no idea their backend VM is re-locating to another ESX server). The primary reasoning for this is ESX maintenance. ...

Learning From the Heartland Credit Card Hack
Three suspected hackers are now facing federal charges in connection with the largest identity theft case ever to reach America's courts. The men are accused of breaking into the files of Heartland Payment Systems, the world's ninth largest credit processing company, and stealing more than 130 million credit and debit card numbers.

Massachusetts makes changes to ID theft regulations
State regulators in Massachusetts have made changes to a set of identity theft regulations.

Solving the DLP Puzzle: Survival Tips from the Trenches
It's no easy task implementing a data loss prevention (DLP) program when there's so much disagreement in the security community over what DLP entails. But those who've been through it have good news: It can be done.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Webinar: ITIL and Access Assurance
View an on-demand webinar with Courion: ITIL and Access Assurance View this webinar and learn how leveraging best practices of Information Technology Infrastructure Library (ITIL) can support your strategy for ensuring that only the right people have the right access to the right resources and are doing the right things.
Click to continue


Biz Intel Reporting
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive.
Learn more.

 

August 28, 2009

TOP STORIES | MOST DUGG STORIES

  1. High-tech blimps earning their wings
  2. The opposite of Twitter
  3. 5 techs that could reinvent cell phones
  4. 12 words you can never say in the office
  5. Wi-Fi encryption cracked in 60 seconds
  6. Cisco's fastest router just got faster
  7. Marines want lots of robots to throw
  8. Group attacks Windows 7's 'sins'
  9. Microsoft, Citrix no longer sponsoring VMworld
  10. Judge overturns 2007 Unix copyright decision

Unified Communications Information Kit
Get the inside track on advanced communications and collaboration solutions from IBM with our complimentary Information Kit. Learn how to reduce your communication costs, consolidate servers, boost productivity and increase your competitive advantage.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: