New & Notable
Evaluating Cloud Computing Providers News
September 19, 2014
Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.
August 06, 2014
At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.
July 18, 2014
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
Evaluating Cloud Computing Providers Get Started
Bring yourself up to speed with our introductory content
Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns. Continue Reading
Understanding the risks of cloud computing is key to protecting a cloud-centric enterprise. Ravila Helen White explains the three must-know dimensions of cloud risk. Continue Reading
The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider. Continue Reading
Evaluate Evaluating Cloud Computing Providers Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Finding the cloud-based identity and access management services and providers that meet your enterprise's needs can be challenging. Dave Shackleford offers the inside scoop on some of today's top cloud provider's IAM offerings. Continue Reading
Developing a secure API design in a cloud environment can be challenging. Expert Dejan Lukan explains what enterprises need to remember when building a secure API. Continue Reading
The Microsoft Office 365 security features are robust, but may not offer the granularity some enterprises need. Expert Dave Shackleford reviews the security pros and cons of Microsoft's cloud-based productivity suite. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Evaluating Cloud Computing Providers
Learn to apply best practices and optimize your operations.
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading
Emerging cloud attacks threaten cloud data security by exploiting the gap between enterprise controls and provider transparency. Continue Reading
Expert Dave Shackleford explains how new cloud firewall management and automation tools can be harnessed to better monitor systems and enact rules. Continue Reading
Problem Solve Evaluating Cloud Computing Providers Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Dave Shackleford details cloud storage access control measures that should be in place internally and at storage provider environments. Continue Reading
This introduction to cloud forensics explores the challenges of collecting cloud network forensic data and finding a provider to support the process. Continue Reading
Security expert Ed Moyle explains the CSA STAR certification program and how enterprises can use it to improve cloud provider security evaluations. Continue Reading