September 07, 2011 Added by:Sasha Nunke
Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities. Qualys provides this free 12-point guide that will help you determine what will work best for your organization...
August 30, 2011 Added by:Rafal Los
The Cloudpocalypse - where you've bought into a cloud service, neglected to understand what you're buying into (service level, liability, etc.) and then are left crying onto your keyboard as your cloud provider tells you, "Sorry, we've lost all your data... but you have a backup somewhere, right?"
August 26, 2011 Added by:Bill Gerneglia
Data Center Transformation: CIOs are feeling the stress of virtualization. The goal is to have more than 100 VMs on each server by 2012. That’s putting stress on the netwok and storage infrastructures which look outdated. The CIO needs to consider the impact of this stress...
August 23, 2011 Added by:Ben Kepes
I’ll not delve into the issues around failover – clearly the lightning strike was a catastrophic event that overcame the protection that both providers have against upstream events. But imagine an uber-catastrophic event that knocked out the entire Dublin Amazon data center...
August 19, 2011 Added by:Infosec Island Admin
Leaving your network vulnerable to exploits can be catastrophic. Learning how hackers and malicious intruders analyze and target your assets can give you a serious advantage in today's high-tech world. Learn how to assess, penetrate, and secure UNIX and Windows networks and hosts...
August 18, 2011 Added by:Brent Huston
Opportunities abound for those who desire to guide cloud computing. Those concerned with keeping cloud computing an open system drafted an Open Cloud Manifesto, asking that a straightforward conversation needs to occur in order to avoid potential pitfalls...
August 16, 2011 Added by:Ben Kepes
The Catch 22 situation – IT cannot free up sufficient dollars to move legacy applications to the Cloud. And because they therefore have to focus a significant proportion of their budget on keeping the lights on, the opportunities for investment in these activities are eroded...
August 13, 2011 Added by:Rafal Los
As applications start to cross network boundaries between the traditional corporate network and cloud-based providers and service vendors, there is an imminent collision between the application development practices of yore, and the differing requirements around architecting for the cloud...
August 12, 2011 Added by:Infosec Island Admin
Receive up to a $500 discount on the Certified Ethical Hacker v7 course offered by Global Knowledge through the ISLAND TRADEWINDS program - Prepare for the CEH certification while learning the latest ethical hacking techniques...
August 08, 2011 Added by:Jason Remillard
The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...
August 08, 2011 Added by:Infosec Island Admin
Receive up to a $500 discount on the Cybersecurity Foundations course offered by Global Knowledge through the ISLAND TRADEWINDS program - Investigate cybersecurity threats and master techniques needed to protect your network...
August 03, 2011 Added by:Ben Kepes
It’s a direct allusion to Government's and corporate’s concerns around location of data – taking advantage of a short term point of difference makes sense for a small provider like that has only a limited window of opportunity to grow before larger and better funded competitors come to market...
August 02, 2011 Added by:Bill Gerneglia
Without central control of purchases, there is no homogeneous IT solution provider across the organization. This leads to inconsistent service, lack of collective purchasing discounts available at higher user volumes, and lack of standard IT policies, making for an IT management nightmare...
July 31, 2011 Added by:Infosec Island Admin
The ISLAND TRADEWINDS program is designed to offer infosec training and certification opportunities at significantly discounted rates. You can receive discounts of up to $500 or 20% on courses from Global Knowledge, Career Academy, SANS, and the Infosec Institute...
July 27, 2011 Added by:Ben Rothke
Companies are spending billions of dollars migrating applications and data centers to the cloud. One is hard pressed to find many Fortune 500s who have not yet used cloud computing. But in the rush to move to the cloud, many companies have neglected to ensure cloud security is built in...
July 15, 2011 Added by:Bozidar Spirovski
The cloud is very ripe for web services. But before you choose one, be careful to do a serious consideration on your pros and cons. If you can match your application/site to a cloud service, you can bring it to a new level of efficient operation...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013