Public Cloud Computing Security News
September 03, 2015
Security researchers discovered a new type of iOS malware that targets jailbroken devices and can allow attackers to take over the devices via iCloud.
August 11, 2015
Startups are dominating the suddenly-hot cloud access security broker market. Now larger vendors are eager to join the party, but will they buy a CASB or build their own cloud security gateway?
July 27, 2015
A glaring error in the Steam password recovery system allowed hackers to take over accounts for Valve's popular gaming platform.
July 24, 2015
Microsoft reportedly agreed to acquire cloud security startup Adallon for $320 million, which analysts say could spark major growth for the cloud security gateway market.
Public Cloud Computing Security Get Started
Bring yourself up to speed with our introductory content
BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys. Continue Reading
Expert Dan Sullivan explains which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises. Continue Reading
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and ... Continue Reading
Evaluate Public Cloud Computing Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dan Sullivan outlines the security issues associated with Docker and explains how the AWS EC2 Container Service can help resolve them. Continue Reading
Public cloud providers reserve the right to shut off vulnerable cloud accounts, but how does it work? Expert Dan Sullivan explains. Continue Reading
Public cloud providers were forced to reboot their cloud instances to implement Xen hypervisor security updates. Learn what these updates mean for public cloud security. Continue Reading
Product ReviewsPowered by IT Central Station
Makes many promises but in order to do so, Qualys requires the client to provide a backdoor to the system.Powered by IT Central Station
The QualysGuard Private Cloud Platform (QG PCP) makes many promises, one of which is that vulnerability scan data can be hosted by a private...Continue Reading
Powered by IT Central Station
Confidence is key when it comes to managing large IT systems. The tricky part is when a CIO tries to generate the trust and confidence of a...Continue Reading
Manage Public Cloud Computing Security
Learn to apply best practices and optimize your operations.
Researchers at Elastica recently discovered an Indian government agency had its employees' email addresses and passwords exposed through Google Drive. Continue Reading
AWS security groups provide network-based blocking mechanisms, much like traditional firewalls. Expert Dan Sullivan explains the differences between the two. Continue Reading
The AWS Key Management Service is a good tool for cloud encryption key management. Expert Dave Shackleford examines AWS KMS and its benefits to enterprises. Continue Reading
Problem Solve Public Cloud Computing Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Kamal Shah of SkyHigh Networks talks with SearchSecurity about the rapid adoption of shadow cloud apps and services in the enterprise. Continue Reading
Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns. Continue Reading
Expert Dave Shackleford explains how new cloud firewall management and automation tools can be harnessed to better monitor systems and enact rules. Continue Reading