Cloud computing

E-mail requirements change for a safe use in the post PRISM internet

Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use. This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is: Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text….

EVENTO SUL CLOUD: IL CLOUD COMPUTING AL SERVIZIO DELLE PICCOLE E MEDIE IMPRESE

IL CLOUD COMPUTING AL SERVIZIO DELLE PICCOLE E MEDIE IMPRESE Type: Event Owner: Easycloud.it Event Date: 2/20/2013 Start Time: 02:00 PM End Time: 05:00 PM Time Zone: (UTC) Casablanca Location: ComoNExt – Parco Scientifico Tecnologico Tags: pmi, cloud computing Details: Agenda inizio ore 16:00– Introduzione al Cloud Computing– Cloudeconomy e il ruolo del Cloud Service Broker– Il Cloud Computing per le PMI: applicazioni a supporto del business – Case study e strumenti per calcolare il ROI ore 18.30 Aperitivo offerto da Easycloud EasyCloud.it cloud service broker – easyCloud www.easycloud.it Easycloud.it è un Cloud Service Broker a supporto delle aziende che…

Società da tenere d’occhio : EASYCLOUD.IT

English: Diagram showing three main types of cloud computing (public/external, hybrid, private/internal) (Photo credit: Wikipedia) Alzi la mano chi non ha sentito parlare di cloud, ed alzi la mano chi lo sta effettivamente usando….. come chi lei cosa? Oggi si fa un gran parlare di cloud service , nuvole e via dicendo, ma ad oggi l’introduzione in azienda di reali servizi clou latita nonostante le interessanti promesse che il clou porta con sé: risparmi a medio lungo termine, mobilità, minor impiego di risorse locali, maggiore resilienza ed efficienza.Uno dei motivi che ostacolano la introduzione dei servizi cloud é che risulta…

Sicurezza informatica: l’Italia è ancora indietro

Sicurezza informatica: l’Italia è ancora indietro: Troppo scarse le misure sul fronte della prevenzione da attacchi informatici prese dalle Pmi. I dati Clusit, Associazione Italiana per la Sicurezza Informatica ha reso noti risultati di un’indagine sulla preparazione delle imprese italiane sul fronte … Guarda tutti gli articoli su questo argomento » Related posts: CLUSIT: Rapporto della sicurezza informatica aziendale nel 2012 Forensic Software Tools Security in a Virtual World V-Valley Security: Cloud e Information Technology GDPR and the technology market Powered by YARPP.

SOA, Cloud and the network–part 1

Image via Wikipedia It is now a quite very long time we talk about new architectures for our environment. What is leading the way, nowadays, is talking about SOA and Cloud, but what do really means for us implementing those architecture in our networks? One of the problem I’ve noticed when talking with customers and partners is that they usually try to use the same techniques they used for the old network deployment to the new ones. this is a mistake for several reasons, but for a mere philosophical point of view make a little, if not at all, sense to apply…

Forensic Software Tools

Image via Wikipedia Forensic Software Tools This post summarizes the features and advantages of a large number of software forensics tools. For detailed information and technical reports it is always best to view the vendor Web sites as well as organizations that conduct technical reviews and evaluations such as National Institute of Standards and Technology (NIST). The Computer Forensic Tools Testing project (CFTT) web site contains additional valuable information: http://www.cftt.nist.gov/disk_imaging.htm http://www.cftt.nist.gov/presentations.htm http://www.cftt.nist.gov/software_write_block.htm The information presented in this chapter is heavily based on the assertions of the various vendors who make the products listed in the chapter. Much of the information…

cloud security

Image via Wikipedia Dome9 Security Protects Access to WordPress Servers with Innovative Cloud …PR Newswire (press release)236) – Dome9 Security™, the leading provider of cloud server security management service for public and private clouds, as well as for dedicated and virtual private servers (VPS), today at HostingCon 2011 announced new support for the WordPress.org … Lessons in security leadership: Andy EllisNetwork WorldThis was 10 years ago, when cloud wasn’t on anyone’s radar. Danny and I went back and forth deciding the minimal set of controls needed for security, and there were days I didn’t think we’d ever build it. Then,…

Security in a Virtual World

Virtualization of the data center is provoking fundamental questions about the proper place for network security services. Will they simply disappear into the One True Cloud, dutifully following applications as they vMotion about the computing ether? Will they remain as a set of modular appliances physically separate from the server computing blob? Should everything be virtualized because it can be? By Throop Wilder Thu, June 04, 2009 — Network World — Virtualization of the data center is provoking fundamental questions about the proper place for network security services. Will they simply disappear into the One True Cloud, dutifully following applications…

Posts navigation