The seven deadly sins of cloud computing
The Cloud Security Alliance has revealed its list of top cloud security threats
Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.
The Cloud Security Alliance has revealed its list of top cloud security threats
Security metrics can help show executives the scope and severity of security the enterprise’s gaps, and they provide a baseline measurement that demonstrates progress as the security program rolls out
Astaro Web Gateway appliance leads to improved security and network monitoring within the City
The IT security information, blogging and partner collaboration Web site will make its way to Canada in 2010
Internet security vendor tries to strike a balance in the market place and with the channel
Exclusive Q&A with Eugene Kaspersky, the founder and CEO of Russian security vendor
Check Point will use its solutions to target these spaces and is relying on partners to help spread the word
Fake software applications can lead to end-user identity fraud or credit card scams: Symantec
The data shows SMB security spending has remained steady and is poised to increase further. Learn where the opportunities are
The vendor is using the cloud to help protect and manage end-user data
The vendor has data that says sticking with older PCs will actually cost SMBs money, and it wants to arm resellers with the facts
Apple’s advertising claims seem comparable to an automobile manufacturer implying that its cars are completely safe and its competitors’ cars are death traps, when we all know that all cars are inherently unsafe
First-ever Storage and Security SMB survey indicates more security awareness and education is needed
Tackling security takes a multi-vendor approach and strong VAR expertise, something Avnet hopes to enable with SecurePath
The vendor’s latest Security Intelligence Report shows fake security software is a rising threat