STE WILLIAMS

Commtouch Completes Name Change To CYREN

Feb
28
  • How Cybercriminals Attack the Cloud

    How Cybercriminals Attack the Cloud

    There’s a lot for enterprises to like about the cloud computing model: It offers easy access to shared, elastically allocated computing resources; it creates savings on capital expenditure; and it reduces the running costs of operating a network. But all of this comes at the cost of control, which increases security challenges for IT pros. In this Dark Reading report, we examine the threat that cloud computing really poses, and we offer advice for tightening cloud providers’ – and your own – security ship.

  • Identifying and Remediating Security Vulnerabilities In the Cloud

    Identifying and Remediating Security Vulnerabilities In the Cloud

    The cloud promises – and often delivers – tremendous cost savings and agility for enterprises. However, whether a company is leveraging the public cloud, a private cloud or some combination thereof, the security equation changes significantly when the cloud is a factor. In this Dark Reading report, we examine the security implications of cloud computing and offer advice for plugging any holes in the model.

  • Strategy, 5 Keys to Painless Encryption

    Strategy, 5 Keys to Painless Encryption

    Encryption is frequently used as the primary method to keep data from being stolen or destroyed. Our 2012 State of Encryption Survey profiles the struggles most IT groups have when trying to manage encryption products. Simply put, the old adage that “encryption is easy, key management is hard” still holds. But we think the game is changing. If you feel stuck with hard decisions and are seeking guidance when it comes to encryption, read on.

  • Other reports from the Cloud Security Tech Center:

Article source: http://www.darkreading.com/commtouch-completes-name-change-to-cyren/240166365

Comments

Comments are closed.