Skip to content
Halkyn Security Blog
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us
Menu Close
  • Home
  • Halkyn Security
  • Our Security Services
  • About Us
  • Contact Us

Cloud Computing

Halkyn Security / Cloud Computing

Encryption – it is your responsibility

  • Post author:Halkyn Security
  • Post published:20 August 2013
  • Post category:Security/Security News/Security Risk Management

Encryption is important. This has always been well known, and with the recent revelations about PRISM and related Government monitoring of communications, people have become understandably more interested in the…

Continue Reading Encryption – it is your responsibility

Amazon Cloud Hosts Malware

  • Post author:Taz Wake - Halkyn Security
  • Post published:29 July 2011
  • Post category:Cloud Computing/Security News

While it may be true that cloud computing is the "future," are will all great new things there are still some issues to be ironed out. It seems that it…

Continue Reading Amazon Cloud Hosts Malware

Cloud Security – Uncrackable Encryption?

  • Post author:Halkyn Security
  • Post published:26 July 2011
  • Post category:Cloud Computing/Security

Cloud computing is frequently presented as the future of how will interact with our data. More and more systems are moving to the various service routes, from software (such as…

Continue Reading Cloud Security – Uncrackable Encryption?

Google launches malware warning service

  • Post author:Taz Wake - Halkyn Security
  • Post published:20 July 2011
  • Post category:Cloud Computing/Security/Security News

Yesterday, the well known and heavily used internet search engine Google introduced a service by which it will warn users when it detects malware signatures on their computer. Working in…

Continue Reading Google launches malware warning service

Cloud Security – Risks and rewards

  • Post author:Halkyn Security Team
  • Post published:22 June 2011
  • Post category:Cloud Computing/Security/Security Education and Awareness/Security Risk Management

There are a lot of business advantages to making use of the cloud for your IT requirements. The ability to make use of shared resources can significantly reduce costs, capital…

Continue Reading Cloud Security – Risks and rewards

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Halkyn Security Tags

Anti Terrorism Asset Protection Breach Business Protection Cloud Computing Company News Compliance Crime Cybersecurity Cyber Security Data Protection DFIR Downloads DPA Encryption European Union Data Protection Financial Government Hacking Halkyn Security Consultants Home Security ICO Identity Management Identity Protection Incident Response Information Security Internet Loss Prevention NHS Office Security Passwords Phishing Physical Security PICERL Risk Management Security Security Awareness Training security education and awareness Security Management Security News Security Risk Management Security Services Security Training Truecrypt Vulnerabilities
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Calendar

January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Nov    

Halkyn Security Posts

  • DFIR on a Shoestring – Incident response for less
  • Linux DFIR: Workflow for a busy responder
  • Linux Incident Response Guide
  • Incident Response Phases – Lessons Learned
  • Incident Response Phases – Recovery
  • Incident Response Phases – Eradication
  • Incident Response Phases – Containment
  • Incident Response Phases – Identification
  • Incident Response Phases – Preparation
  • Incident Response – Process Matters

Follow Us

  • Twitter
Copyright - OceanWP Theme by Nick