Friday 22 April 2011

Amazon EC2 debacle drags on into Day 2

Video: Amazon's EC2 outage | Researchers make weak passwords strong with CAPTCHAs plus an algorithm

Network World Security

Forward this to a Friend >>>


Amazon EC2 debacle drags on into Day 2
Amazon isn't saying exatly what's wrong, but its East Coast outage that has sidelined some big-name Web sites hosted by Amazon EC2 is still limiting service. Read More


WHITE PAPER: Dell

Guidelines for Choosing a QSA
The independent white paper in this security KnowledgeVault is just one of the resources to help you make the right decision. It details the top 5 questions to ask a prospective QSA firm and offers guidelines on everything from making sure they adequately handle compensating controls to assessing their expertise with virtualization. Learn more.

WHITE PAPER: Splice Communications

The Benefits of Outsourcing Telecom Management
Choosing the right network solutions provider (NSP) will help businesses improve network reliability, service quality, operating efficiency, billing accuracy and better allocation of resources – all reducing the total cost of ownership of your network infrastructure. Many companies have realized the benefits of working with an NSP. Read now!

Video: Amazon's EC2 outage
Keith Shaw chats with Network World's Jon Brodkin about the Amazon EC2 cloud service outage and what it means to businesses considering using cloud services. Read More

Researchers make weak passwords strong with CAPTCHAs plus an algorithm
Researchers have found a way to get around the persistent problem of remembering strong passwords -- break them in two in such a way that one part is easy to remember and is used to encrypt and decrypt the other part that is long and complex. Read More


WHITE PAPER: Coyote Point

Ensuring Disaster Recovery with Equalizer and Envoy
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geo¬graphic location or data center. See this and other independent product reviews available by clicking here. Read More

State Police can suck data out of cell phones in under two minutes
Michigag State Police have a device that captures all the information stored on mobile phones but won't say how and when they use it. Read More

Security start-up gives PC shoulder surfers the cold shoulder
Start-up Oculis Labs says it's got security software that obscures the display on a computer screen when a user walks away or when someone approaches within 15 feet of it while it's in use in order to prevent people from peeping over other people's shoulders to see what they're up to. Read More


WHITE PAPER: Dell

Defending the Assault on Your Data
Learn how turning to outside help, specifically designed for small and midsized businesses, can affordably provide the protection you need. It's just one of the resources, along with expert Webcasts and IDG security survey results, you'll find in this data security KnowledgeVault. Learn more.

Dropbox CTO responds to privacy concerns
Dropbox has alwlays been willing to decrypt and hand over customer files to federal authorities armed with the appropriate warrants, but stating that policy explicitly has caused a flap for the storage/synching service provider. Read More

Security firm founder Kaspersky's son reportedly kidnapped in Russia
Several news services are reporting that the son of Eugene Kaspersky, founder of the Moscow-based security firm Kaspersky Labs, has been kidnapped for ransom in Russia. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

13 cool features of Office 365
Microsoft released the official beta version of Office 365 today, but we've been playing with it for a while now. Here are 13 cool features of the cloud-based service that combines Office, SharePoint, Lync and Exchange.

MOST-READ STORIES

  1. Asia out of IPv4 addresses
  2. Four things RIM's PlayBook got wrong
  3. Six Windows 7 nightmares (and how to fix them)
  4. Computer factories eat more energy than the devices they build
  5. Hacker 'handshake' hole found in common firewalls
  6. OpenFlow opens new doors for networks
  7. Red Hat becomes cloud service provider
  8. 10 must-have utilities for small networks
  9. Berners-Lee: Web access is a 'human right'
  10. Did you hear about the hacker who stole the open source code?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment