New & Notable
Evaluating Cloud Computing Providers News
September 19, 2014
Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.
August 06, 2014
At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.
July 18, 2014
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
Evaluating Cloud Computing Providers Get Started
Bring yourself up to speed with our introductory content
Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns. Continue Reading
Understanding the risks of cloud computing is key to protecting a cloud-centric enterprise. Ravila Helen White explains the three must-know dimensions of cloud risk. Continue Reading
The Cloud Controls Matrix is a baseline set of security controls created by the Cloud Security Alliance to help enterprises assess the risk associated with a cloud computing provider. Continue Reading
Evaluate Evaluating Cloud Computing Providers Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Developing a secure API design in a cloud environment can be challenging. Expert Dejan Lukan explains what enterprises need to remember when building a secure API. Continue Reading
The Microsoft Office 365 security features are robust, but may not offer the granularity some enterprises need. Expert Dave Shackleford reviews the security pros and cons of Microsoft's cloud-based productivity suite. Continue Reading
Cloud service brokers can simplify management and reduce costs, but do they hinder security? Learn the cloud broker benefits and challenges. Continue Reading
Manage Evaluating Cloud Computing Providers
Learn to apply best practices and optimize your operations.
Emerging cloud attacks threaten cloud data security by exploiting the gap between enterprise controls and provider transparency. Continue Reading
Expert Dave Shackleford explains how new cloud firewall management and automation tools can be harnessed to better monitor systems and enact rules. Continue Reading
Expert Dave Shackleford details cloud storage access control measures that should be in place internally and at storage provider environments. Continue Reading
Problem Solve Evaluating Cloud Computing Providers Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
This introduction to cloud forensics explores the challenges of collecting cloud network forensic data and finding a provider to support the process. Continue Reading
Security expert Ed Moyle explains the CSA STAR certification program and how enterprises can use it to improve cloud provider security evaluations. Continue Reading
Expert Ed Moyle analyzes five key cloud computing security concerns vexing enterprises and the emerging products that are attempting to address them. Continue Reading