SearchCloudSecurity

New & Notable

Evaluate

The advantages of Microsoft Security Risk Detection

Microsoft SRD is a new cloud service that aims to detect vulnerabilities in software using artificial intelligence. Expert Dave Shackleford explains what that means.

Manage

IAM in the cloud requires thorough security checks

Don't store identity and access data in the cloud without first taking cloud access control seriously. Expert Rob Shapland explains the security considerations for enterprises.

Get Started

How to secure a serverless application

Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured.

Problem Solve

How to set up Amazon S3 buckets to prevent data exposure

Several recent data exposures have involved misconfigured Amazon S3 buckets. Dave Shackleford discusses the importance of proper cloud access control and how to implement it.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    Google Cloud Key Management Service (KMS)

    Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions.

  • Get Started

    How to secure a serverless application

    Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured.

  • Get Started

    Does your organization need to revisit CASBs?

    Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets.

View All Get Started

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Patch Management and Cloud Configuration Management

    G Suite access permissions mishaps could cause leaks

    G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.

  • Cloud Data Storage, Encryption and Data Protection Best Practices

    Amazon warns users about public AWS S3 buckets

    Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.

  • Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus

    Tenable unveils vulnerability data exchange

    At RSA Conference 2017, Tenable Network Security introduced a cloud-based vulnerability management platform called Tenable.io that allows users to import and export vulnerability data.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close