Search This Blog

Monday, October 26, 2009

Microsoft wants ISO security certification for its Cloud services

NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors; Week in Security: Windows 7 a go; Steve Ballmer a pro; ChoicePoint, MoneyGram face woe
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by HP
rule

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.

Learn more

rule

Spotlight Story
Microsoft wants ISO security certification for its Cloud services

Microsoft Corp. wants to get its suite of hosted messaging and collaboration products certified to the ISO 27001 international information security standard, part of an effort to assure customers about the security of its cloud computing services. Read full story

Related News:

NIST SP800-53 Rev. 3: Key to Unified Security Across Federal Government and Private Sectors
Standards play a critical role in information assurance. Given the impossibility of defining a deterministic model that includes billions of users, millions of computers, and thousands of programs and protocols potentially interacting with each other unpredictably, we have to rely on human consensus about best practices if we are to progress in our field. Standards also provide a basis for demonstrating due care and diligence in fulfilling our fiduciary responsibilities to stakeholders.

Week in Security: Windows 7 a go; Steve Ballmer a pro; ChoicePoint, MoneyGram face woe
A look back at all things security for the past week:

Trend Micro bolsters virtualization security options
Trend Micro's Deep Security firewall/intrusion-protection system software for VMware's ESX server can protect multiple virtual machines on one physical server.

IT industry graveyard 2009
Paying respects to Nortel as we knew it, Circuit City and more

Data masking secures sensitive data in non-production environments
Sensitive data is a part of every large organization's normal business practice. Allowing sensitive data from production applications to be copied and used for development and testing environments increases the potential for theft, loss or exposure -- thus increasing the organization's risk. Data masking is emerging as a best practice for obfuscating real data so it can be safely used in non-production environments. This helps organizations meet compliance requirements for PCI, HIPAA, GLBA and other data privacy regulations.

NASA's future: Now the battle begins
When it comes down to it, NASA is the most accomplished space organization in the world but its human spaceflight activities are at a tipping point, primarily due to a mismatch of goals and money.

DHS to get big boost in cybersecurity spending in 2010
The U.S. Department of Homeland Security will likely have a substantially bigger cybersecurity budget for fiscal 2010 compared to this year.

Anonymity of users is key issue in cyber crime: Kaspersky
The relative anonymity of Internet users is the key issue in managing cyber crime, according Eugene Kaspersky, founder of Russian security firm Kaspersky.

Analysis: Real ID program on life support
A decision by lawmakers in Congress to slash funding for the unpopular Real ID national driver's license program has put an already struggling program on life support.

Study: US gov't cybersecurity spending to grow significantly
U.S. government spending on cybersecurity will grow at a compound rate of 8.1 percent a year between 2009 and 2014, outpacing general IT spending, according to the government analyst firm Input.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More


Strategies to Cut Applications Costs
Application mining tools have the power to decrease costs, increase developer productivity, and enhance application quality — as long as you make informed buying decisions. This white paper explains how to evaluate application mining tools for your own business case and features an ROI calculator to help you quantify the benefits.
Strategies to Cut Applications Costs

 

October 26, 2009

MOST-READ STORIES

  1. McCain introduces bill to block FCC's net neutrality rules
  2. FAQ: What's the FCC vote on net neutrality all about?
  3. Goodbye steering wheel, here comes drive-by-joystick
  4. Torvalds offers a thumbs up to Windows 7
  5. Security hole turned 64,000 Time Warner cable modems into hacker prey
  6. Smartphones for the holidays
  7. AT&T weighs higher fees for data hogs
  8. 10 people you won't see at Microsoft's Windows 7 launch party
  9. Gartner on cloud security: "Our nightmare scenario is here now"
  10. Microsoft, Dell, Spectrum Bridge launch first public white spaces network

802.11n Drives an Architectural Evolution
The sharp capacity increase possible with 802.11n is a compelling force behind the evolution in WLAN architectures. This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Learn more



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: