Secrecy of cloud computing providers raises IT security risks |
- Secrecy of cloud computing providers raises IT security risks
- eBay fraudster hit with £5,000 fine
- UK 6th in countries least likely to launch cyberattacks
- Suspicious Facebook app attracts nearly 300,000 fans
- North Korea 'not responsible' for 4 July cyberattacks
- Microsoft clamps down on software pirates
- Angry researchers disclose Windows zero-day bug
- Honeypots for hacker detection
- Who to call when identifying a problem or planning a deployment gets beyond you
- Should You Trust Google?
Secrecy of cloud computing providers raises IT security risks Posted: 06 Jul 2010 03:00 AM PDT Despite how attractive cloud computing can sound as an outsourcing option, there's widespread concern that it presents a security and legal minefield. Cloud service providers often cultivate an aura of secrecy about data centers and operations, claiming this stance improves their security even if it leaves everyone else in the dark. |
eBay fraudster hit with £5,000 fine Posted: 06 Jul 2010 09:00 AM PDT |
UK 6th in countries least likely to launch cyberattacks Posted: 06 Jul 2010 09:00 AM PDT |
Suspicious Facebook app attracts nearly 300,000 fans Posted: 06 Jul 2010 09:00 AM PDT |
North Korea 'not responsible' for 4 July cyberattacks Posted: 06 Jul 2010 09:00 AM PDT North Korea appears finally to be off the hook for a large cyberattack against US and South Korean websites a year ago that severely annoyed its southern neighbour. |
Microsoft clamps down on software pirates Posted: 06 Jul 2010 09:00 AM PDT |
Angry researchers disclose Windows zero-day bug Posted: 06 Jul 2010 09:00 AM PDT |
Honeypots for hacker detection Posted: 06 Jul 2010 09:00 AM PDT Most corporate networks lack serious oversight, that is, no one is really watching. Watching the network and computer systems is expensive, overwhelming and fraught with false positives. No wonder then that insider attacks go undetected for months, malware proliferates stealthily and hackers can spend their time gradually infiltrating deeper and deeper, undetected. |
Who to call when identifying a problem or planning a deployment gets beyond you Posted: 06 Jul 2010 09:00 AM PDT |
Posted: 05 Jul 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment