SearchCloudSecurity

New & Notable

Manage

The cloud security threat-modeling process: Laying the groundwork

The cloud threat-modeling process begins with a fundamental understanding of threat management. Expert Ravila Helen White details these best practices for enterprises.

Get Started

Server configuration management on IaaS clouds

IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.

News

Apple iCloud hit with MitM attacks in China

There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.

Get Started

Crafting a secure data backup strategy on a private cloud

Planning a data backup strategy on a private cloud requires certain factors to assure security. Expert Dejan Lukan gives some advice on what to take into consideration.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    CAIQ (Consensus Assessments Initiative Questionnaire)

    The Consensus Assessments Initiative Questionnaire (CAIQ) is a survey provided by the Cloud Security Alliance (CSA) for cloud consumers and auditors to assess the security capabilities of a cloud provider.

  • Get Started

    Microsoft Cloud Security Readiness Tool (CSRT)

    The Microsoft Cloud Security Readiness Tool (CSRT) is a survey that assesses the systems, processes and productivity of an IT environment in preparation for the adoption and secure use of cloud computing services.

  • Get Started

    Best practices for IaaS configuration management

    IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Computing Security Issues: Incident Response - Data Breach Prevention

    How cloud file sharing in the enterprise creates shadow data

    A new study by cloud security startup Elastica shows that enterprise employees are unknowingly leaking sensitive data through cloud apps and services.

  • Cloud Data Storage, Encryption and Data Protection Best Practices

    New iPhone launch spurs attacks against iCloud in China

    There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.

  • Cloud Data Storage, Encryption and Data Protection Best Practices

    Dropbox hacked? Not so fast, company says

    Dropbox refuted reports that a hacker had obtained 6.9 million customer usernames and passwords from the cloud storage service, but encouraged customers to use its 2FA security feature regardless.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close