New & Notable


Experts mixed on Google's Cloud KMS

Experts are impressed with the simplicity of Google's Cloud KMS even if it doesn't separate itself from the key management service competition.

Problem Solve

Understanding the Flip Feng Shui exploit

The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle explains how the exploit works and how to deal with it.


How cloud-based endpoint security protects enterprises

Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of these products and how they benefit enterprises.


How multiparty computation can improve cloud security

Microsoft's new service, Secure Data Exchange, can help protect cloud data while in transit and at rest. Expert Rob Shapland looks at the service and how it works for enterprises.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

View All Get Started

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus

    Azure-based fuzz testing service previewed by Microsoft

    Microsoft's 'million-dollar bug detector' on offer in preview of Project Springfield, an Azure-based fuzz testing service announced at Ignite 2016.

  • Cloud Computing Software as a Service (SaaS) Security

    CASB market shrinks as Oracle snags Palerra

    At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.

  • Cloud Network Security Trends and Tactics

    Netskope reports on growing cloud ransomware threats

    Netskope cloud report reveals growth in threat from cloud ransomware as infected enterprises average 26 files carrying malware, over half of infected files shared publicly.