New & Notable

Get Started

Backup as a service: What are the proper security controls?

While backup as a service sounds like a great idea, there are several considerations to keep in mind prior to jumping in feet first. Expert Dan Sullivan explains.


Study finds financial firms lack cloud security strategies

A cloud security strategy is critical for financial organizations, but many in the industry are dragging their feet. Expert Dave Shackleford explains why.


Limit damage after AWS encryption key exposure

Exposing encryption keys is never a good thing, but knowing the steps to take after such an incident can help limit damage to an enterprise. Expert Dan Sullivan explains.


How to secure cloud credentials and avoid insecure passwords

Weak passwords are a common threat to enterprises relying on cloud services. Expert Dejan Lukan reviews some password best practices.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

View All Get Started

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Computing Software as a Service (SaaS) Security

    Cloud access security broker market booming

    Startups are dominating the suddenly-hot cloud access security broker market. Now larger vendors are eager to join the party, but will they buy a CASB or build their own cloud security gateway?

  • Cloud Computing Software as a Service (SaaS) Security

    Microsoft to acquire cloud security startup Adallom

    Microsoft reportedly agreed to acquire cloud security startup Adallon for $320 million, which analysts say could spark major growth for the cloud security gateway market.

  • Cloud Computing Software as a Service (SaaS) Security

    Healthcare cloud services: A security risk or a safer haven?

    Healthcare organizations are increasing their cloud service usage, but is the cloud making them safer or creating more security issues?