Service Provider

6429389c5e8a4c9555be876f8484331a

Guide: A Vulnerability Management Buyer's Checklist

September 07, 2011 Added by:Sasha Nunke

Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities. Qualys provides this free 12-point guide that will help you determine what will work best for your organization...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cloudpocalypse - When the Cloud Eats Your Corporate IP

August 30, 2011 Added by:Rafal Los

The Cloudpocalypse - where you've bought into a cloud service, neglected to understand what you're buying into (service level, liability, etc.) and then are left crying onto your keyboard as your cloud provider tells you, "Sorry, we've lost all your data... but you have a backup somewhere, right?"

Comments  (2)

44fa7dab2a22dc03b6a1de4a35b7834a

Four Cloud Trends on the CIOs Radar

August 26, 2011 Added by:Bill Gerneglia

Data Center Transformation: CIOs are feeling the stress of virtualization. The goal is to have more than 100 VMs on each server by 2012. That’s putting stress on the netwok and storage infrastructures which look outdated. The CIO needs to consider the impact of this stress...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Microsoft and Amazon Outages – The Need for More Redundancy

August 23, 2011 Added by:Ben Kepes

I’ll not delve into the issues around failover – clearly the lightning strike was a catastrophic event that overcame the protection that both providers have against upstream events. But imagine an uber-catastrophic event that knocked out the entire Dublin Amazon data center...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Foundstone Ultimate Hacking Training Course Discount

August 19, 2011 Added by:Infosec Island Admin

Leaving your network vulnerable to exploits can be catastrophic. Learning how hackers and malicious intruders analyze and target your assets can give you a serious advantage in today's high-tech world. Learn how to assess, penetrate, and secure UNIX and Windows networks and hosts...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Seven Areas of Concern With Cloud Security

August 18, 2011 Added by:Brent Huston

Opportunities abound for those who desire to guide cloud computing. Those concerned with keeping cloud computing an open system drafted an Open Cloud Manifesto, asking that a straightforward conversation needs to occur in order to avoid potential pitfalls...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

The Great Cloud Blockage: 80/20

August 16, 2011 Added by:Ben Kepes

The Catch 22 situation – IT cannot free up sufficient dollars to move legacy applications to the Cloud. And because they therefore have to focus a significant proportion of their budget on keeping the lights on, the opportunities for investment in these activities are eroded...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hybrid Delivery: Corporate Applications and the Cloud

August 13, 2011 Added by:Rafal Los

As applications start to cross network boundaries between the traditional corporate network and cloud-based providers and service vendors, there is an imminent collision between the application development practices of yore, and the differing requirements around architecting for the cloud...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Certified Ethical Hacker v7 Training Course Discount

August 12, 2011 Added by:Infosec Island Admin

Receive up to a $500 discount on the Certified Ethical Hacker v7 course offered by Global Knowledge through the ISLAND TRADEWINDS program - Prepare for the CEH certification while learning the latest ethical hacking techniques...

Comments  (0)

Ba5964a1284ac16d4277991e7225699c

Enterprise IT - Surprisingly Repetitive

August 08, 2011 Added by:Jason Remillard

The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cybersecurity Foundations Training Course Discount

August 08, 2011 Added by:Infosec Island Admin

Receive up to a $500 discount on the Cybersecurity Foundations course offered by Global Knowledge through the ISLAND TRADEWINDS program - Investigate cybersecurity threats and master techniques needed to protect your network...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Rolling Out the Cloud In Australasia

August 03, 2011 Added by:Ben Kepes

It’s a direct allusion to Government's and corporate’s concerns around location of data – taking advantage of a short term point of difference makes sense for a small provider like that has only a limited window of opportunity to grow before larger and better funded competitors come to market...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Informal Cloud Buyers - A Growing IT Problem

August 02, 2011 Added by:Bill Gerneglia

Without central control of purchases, there is no homogeneous IT solution provider across the organization. This leads to inconsistent service, lack of collective purchasing discounts available at higher user volumes, and lack of standard IT policies, making for an IT management nightmare...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Tradewinds: Discounts on Infosec Training and Certification

July 31, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...

Comments  (4)

3e35900ae6facc6c146a85c435c71d82

Cloud Computer Security Techniques and Tactics

July 27, 2011 Added by:Ben Rothke

Companies are spending billions of dollars migrating applications and data centers to the cloud. One is hard pressed to find many Fortune 500s who have not yet used cloud computing. But in the rush to move to the cloud, many companies have neglected to ensure cloud security is built in...

Comments  (0)

E973b16363b3de77b360563237df7e32

The Cloud - Time for Some Serious Consideration

July 15, 2011 Added by:Bozidar Spirovski

The cloud is very ripe for web services. But before you choose one, be careful to do a serious consideration on your pros and cons. If you can match your application/site to a cloud service, you can bring it to a new level of efficient operation...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »