Cloud Computing Security Issues: Incident Response - Data Breach Prevention News
February 10, 2016
Now that enterprise data is stored in clouds of all shapes and sizes, IT needs to provide more security options than ever. This ezine supplement focuses on the issue of cloud safety and zones in on three of the latest cloud developments and their ...
July 09, 2015
Researchers at Elastica recently discovered an Indian government agency had its employees' email addresses and passwords exposed through Google Drive.
June 19, 2015
A new report from Netskope finds copious DLP violations in enterprises' cloud apps due to insufficient cloud storage security.
June 08, 2015
A new study from cloud access security broker Elastica shows a growing amount of shadow data is leaking out of enterprises via cloud services.
Cloud Computing Security Issues: Incident Response - Data Breach Prevention Get Started
Bring yourself up to speed with our introductory content
Deciding on cloud malware analysis tools can be a confusing process for organizations. Here's how to know which one is right for your business. Continue Reading
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and ... Continue Reading
Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Cloud Computing Security Issues: Incident Response - Data Breach Prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This Security School covers the latest in cloud security providers and in-house IaaS, outlining how enterprises can get the most out of both options. Continue Reading
Cloud providers are expanding their log and event management offerings to meet enterprise needs. Expert Dave Shackleford discusses the changes in the CSP marketplace and details five of today's vendors to consider during evaluation. Continue Reading
New cloud logging and event management products and services are emerging to help enterprises transition assets to the cloud, however finding the proper tool can be a challenge. Dave Shackleford offers hints to ease the process. Continue Reading
Manage Cloud Computing Security Issues: Incident Response - Data Breach Prevention
Learn to apply best practices and optimize your operations.
Centrally managing system logs is an important practice for enterprise security. Expert Dejan Lukan explains how to set up cloud servers, such as ELK stack, for this purpose. Continue Reading
Open source log monitoring tools are a budget-friendly way for organizations to increase network visibility and improve incident response times. Continue Reading
In this excerpt of CSA Guide to Cloud Computing, authors Rai Samani, Brian Honan and Jim Reavis review cloud security threats based on research by the CSA's Top Threats Working Group. Continue Reading
Problem Solve Cloud Computing Security Issues: Incident Response - Data Breach Prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The increased use of cloud applications has caused a parallel increase in shadow data loss. Expert Dan Sullivan explains how to prevent the risk. Continue Reading
Qualys CEO Philippe Courtot spoke at RSA Conference 2015 about why security firms need to take a page from Doctors Without Borders. Continue Reading
Though shadow cloud threatens enterprise security, there are ways to lessen the risks and protect organizations' systems and applications. Continue Reading