Top

Hack Attack – Philly Summit Helps Businesses Protect Themselves From Becoming Latest Online Victim

June 30, 2011 by · Comments Off on Hack Attack – Philly Summit Helps Businesses Protect Themselves From Becoming Latest Online Victim 

Hosting ServicesALLENTOWN, PA – With a string of Fortune 500 companies making the news because of hacker attacks, leading managed hosting and cloud provider INetU Managed Hosting is helping Philadelphia IT executives and business leaders protect their organizations from crippling data breaches at the 2011 ITX Data Security Summit, held on Wednesday, July 13 at the Penn State Great Valley Campus Auditorium in Malvern, Pa. The ITX Data Security Summit is open to business and IT professionals at no charge.

“The internet is no longer the friendly neighborhood it used to be,” said Scott Walters, director of client services at INetU. “Highly skilled professional criminals are actively looking to undermine companies and this summit is a great opportunity to learn what types of threats are out there and what businesses can do to better protect themselves.”

Online data breaches can be an incredibly costly issue for any organization. Hacked private data can cost companies up to $60 million in fines and charges – not including the waves of negative publicity and impact on customer confidence. The ITX Data Security Summit presents topics that help companies protect themselves from damaging data breaches and features experts from INetU, Microsoft, Elman Technology Law, Integrated Computer Solutions, Inc, and Trustwave. To register for the ITX Data Security Summit, visit www.itexpertseries.com.

Topic discussions at the 2011 ITX Data Security Summit include:

CIAvailability: Tips from the Trenches (9:00 – 10:00 a.m.)
With the recent explosion of compliance and security concerns around IT systems, it’s easy to forget about the availability piece of confidentiality, integrity and availability (CIA). When you mix in virtualization and the cloud, the focus can get increasingly fuzzy. In this discussion, participants will learn lessons from real world circumstances that affect the availability of web sites. Presented by Scott Walters, Director of Client Services, INetU.

Security on the Cloud (10:30 – 11:30 p.m.)
Everyone, as they say, is “taking it to the cloud.” But how can you keep private data in the cloud secure while benefiting from virtualization? This presentation discusses how to obtain a compliant cloud infrastructure as technology relies on virtualization more than ever. Presented by Hameed Mohammed, Industry Solutions Manager, Microsoft.

Trustwave Global Security Report 2011 (1:00 – 2:00 p.m.)
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave’s SpiderLabs, the Global Security Report identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. Presented by Charles Henderson, Director of Application Security Services, SpiderLabs Trustwave.

Are You Legally Prepared for the Coming Cyberwar? (2:30 – 3:30 p.m.)
Will a virus like Stuxnet be your firm’s downfall or will hackers called Anonymous penetrate your defenses first? It’s just a matter of time before a trusted employee reports his or her smartphone is missing and customer data has been compromised. And after that, the news crew will be showing up in your lobby demanding details on the latest data breach. The question is no longer if, but when will your legal playbook be ready when the cyberwar games begin? Presented by Gerry Elman, M.S., J.D., Elman Technology Law, P.C.

Attack & Penetration through USB Weaponization (4:00 – 5:00 p.m.)
Are your current work security practices are vulnerable? Attack & Penetration through USB Weaponization will cover the methods of circumventing physical and technical security controls via social engineering. The demonstration will discuss the vulnerabilities with current security and operational policies, social engineering opportunities and a technical demonstration of a USB-based attack tool. In this discussion, learn how to circumvent multiple physical, computer and network security controls to see if your security practices are solid. Presented by Steve Goldsby, President/CEO, Integrated Computer Solutions, Inc. Read more

Yahoo! Launches Cloud Computing with the Availability of Yahoo! Distribution of Hadoop

June 11, 2009 by · Comments Off on Yahoo! Launches Cloud Computing with the Availability of Yahoo! Distribution of Hadoop 

WebHost ToolsSUNNYVALE, Calif. – Yahoo! Inc. (Nasdaq:YHOO), a leading global Internet company, today announced the availability of the Yahoo! Distribution of Hadoop at the Second Annual Hadoop Summit. The Yahoo! Distribution of Hadoop is based on code available from the Apache Hadoop project, an open source project of the Apache Software Foundation. Hadoop is a distributed file system and parallel execution environment that enables its users to process massive amounts of data. In response to frequent requests from the Hadoop community, Yahoo! is opening up its investment in Hadoop quality engineering to benefit the larger ecosystem and to increase the pace of innovation around open and collaborative research and development. The Yahoo! Distribution of Hadoop has been tested and deployed at Yahoo! on the largest Hadoop clusters in the world.

“We know from our own experience serving half a billion users worldwide requires large-scale distributed systems, and a growing number of other companies and organizations are in need of similar capabilities,” said Shelton Shugar, senior vice president of cloud computing at Yahoo!. “Yahoo! was a pioneer in developing the Hadoop technology and now Hadoop provides Yahoo! key software infrastructure running on tens of thousands of machines to process data critical to Yahoo!’s core business. By making the Yahoo! Distribution of Hadoop generally available, we are contributing back to the Apache Hadoop community so that the ecosystem can benefit from Yahoo!’s quality and scale investments.” Read more

Bottom