By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Cloud Security Management and Cloud Operations Security News
July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
July 19, 2017
Following a number of data leaks related to improper AWS S3 bucket policies, Amazon has begun sending warning emails to users with public permissions.
June 29, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss how the Republican National Committee's voter database was accidentally exposed in an Amazon S3 bucket.
April 12, 2017
Microsoft fundamentally changes how IT pros will consume Patch Tuesday releases with the Security Update Guide and brings fixes for an actively exploited Word zero-day.
Cloud Security Management and Cloud Operations Security Get Started
Bring yourself up to speed with our introductory content
Strong Kubernetes security is important to keep out attackers looking to use compromised containers for malicious activities, like bitcoin mining. Expert Dave Shackleford explains. Continue Reading
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers. Continue Reading
Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with ... Continue Reading
Evaluate Cloud Security Management and Cloud Operations Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Botnets are evolving and will continue to plague organizations. There is no one tool that will be sufficient, so it’s time to layer your anti-botnet defenses. Continue Reading
Enterprise anti-botnet defenses, to be effective, must be added in multiple layers. No single security product will do the trick, but the right combo of tools can. Continue Reading
The use of secure enclaves in the Microsoft Azure confidential computing update aims to improve cloud storage security. Expert Rob Shapland explains how it works. Continue Reading
Manage Cloud Security Management and Cloud Operations Security
Learn to apply best practices and optimize your operations.
While a black swan incident shut down Code Spaces, IT service providers and their customers can avoid a similar outcome, if they devise a comprehensive data protection plan. Continue Reading
Identity and access management (IAM) is a framework for business processes that facilitates the management of electronic or digital identities. Continue Reading
Although healthcare organizations have wavered on trusting their data to cloud service providers, there are areas where the cloud excels in security. Continue Reading
Problem Solve Cloud Security Management and Cloud Operations Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprises can ensure a secure cloud migration by avoiding specific risks. Expert Judith Myerson outlines what to look for and what mistakes not to make when moving to the cloud. Continue Reading
Not handling configuration management in the cloud correctly can unintentionally expose sensitive enterprise data. Expert Ed Moyle explains how to make sure this doesn't happen. Continue Reading
Enterprises using the cloud should be particularly careful to avoid an insider data breach. Expert Frank Siemons explains why it's important to stop insider threats in the cloud. Continue Reading