SearchCloudSecurity

New & Notable

News

Shining a light on shadow cloud apps and services

Security pros from Hewlett-Packard and SkyHigh Networks offer insight on how to identify shadow cloud apps and services within the enterprise.

Get Started

Data security in cloud computing: Data encryption controls

Implementing data encryption controls in a cloud environment can be quite challenging for organizations using those services. Ed Moyle discusses the first two steps to implementing data security in the cloud.

News

Experts: Expect cloud breaches to endanger data privacy

Attendees and speakers at the CSA Congress and IAPP Privacy Academy stressed the need for better data classification to reduce the effects of cloud breaches.

News

Pandora balancing cloud app security and shadow IT

Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    Data encryption controls in cloud environments

    Implementing data encryption controls in a cloud environment can be quite challenging for organizations using those services. Ed Moyle discusses the first two steps to implementing data security in the cloud.

  • Get Started

    How to protect Docker hosting in the cloud

    Docker hosting in the cloud is growing in popularity. Expert Dave Shackleford explains how Docker works and what security troubles enterprises should watch out for.

  • Get Started

    Securing iSCSI network communication

    Expert Dejan Lukan looks at iSCSI security, the possible attacks on networks using iSCSI and CHAP security.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Computing Frameworks and Standards

    Does the cloud need global data privacy standards?

    A recent study from the Cloud Security Alliance shows strong support for global data privacy standards as well as a consumer bill of rights, but there are major obstacles for privacy in the cloud.

  • Cloud Data Storage, Encryption and Data Protection Best Practices

    How to spot shadow cloud usage and risks

    Security pros from Hewlett-Packard and SkyHigh Networks offer insight on how to identify shadow cloud apps and services within the enterprise.

  • Cloud Data Storage, Encryption and Data Protection Best Practices

    Experts: Cloud breaches an inevitable threat to data privacy

    Attendees and speakers at the CSA Congress and IAPP Privacy Academy stressed the need for better data classification to reduce the effects of cloud breaches.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close