By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Cloud Security Management and Cloud Operations Security News
July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
June 29, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss how the Republican National Committee's voter database was accidentally exposed in an Amazon S3 bucket.
April 12, 2017
Microsoft fundamentally changes how IT pros will consume Patch Tuesday releases with the Security Update Guide and brings fixes for an actively exploited Word zero-day.
Cloud Security Management and Cloud Operations Security Get Started
Bring yourself up to speed with our introductory content
Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions. Continue Reading
A solid application security strategy today must include varieties like cloud apps and mobile. Learn how to set application security policies and practices that keep hackers out. Continue Reading
Threat analysis tools need to be in top form to counter a deluge of deadly security issues. Here are tips for getting the most from your analytics tool. Continue Reading
Evaluate Cloud Security Management and Cloud Operations Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft SRD is a new cloud service that aims to detect vulnerabilities in software using artificial intelligence. Expert Dave Shackleford explains what that means. Continue Reading
The cloud continues to be popular and useful for many organizations. Cloud-based backup is an important component of data protection, but it's not the only component. Continue Reading
Bringing new application types and integration points into the enterprise, cloud can complicate user identity management. So, how can you be sure your data is secure? Continue Reading
Manage Cloud Security Management and Cloud Operations Security
Learn to apply best practices and optimize your operations.
Don't store identity and access data in the cloud without first taking cloud access control seriously. Expert Rob Shapland explains the security considerations for enterprises. Continue Reading
Instances created, but then forgotten can cause zombie cloud infrastructures that threaten the security of enterprises. Expert Frank Siemons discusses how to handle these systems. Continue Reading
Help is on the way. Companies moving to public cloud infrastructure try out a new crop of cloud visibility tools to monitor configurations and security policy. Continue Reading
Problem Solve Cloud Security Management and Cloud Operations Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A verification flaw in the synchronization service of iCloud Keychain enables attackers to intercept the data it transfers. Expert Frank Siemons explains what to do about it. Continue Reading
Several recent data exposures have involved misconfigured Amazon S3 buckets. Dave Shackleford discusses the importance of proper cloud access control and how to implement it. Continue Reading
Securing custom applications in the cloud can be a hassle for enterprises. Expert Ed Moyle discusses how to make it easier to secure custom cloud apps. Continue Reading