New & Notable
Public Cloud Computing Security News
October 20, 2014
There is more potential trouble for Apple iCloud users as a nationwide man-in-the-middle attack struck the iCloud website in China amid the country's launch of the new iPhone 6.
September 02, 2014
CERN and the Cloud Security Alliance explain how federated identity management protects Helix Nebula, a European cloud platform that's running applications for such research projects as the Large Hadron Collider.
May 07, 2014
A Netskope report shows a flood of cloud security policy exceptions commonly thwart rogue cloud app security controls.
April 25, 2014
A new report shows the volume of cloud attacks is rising, as attack types traditionally associated with on-premises environments migrate with users.
Public Cloud Computing Security Get Started
Bring yourself up to speed with our introductory content
Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns. Continue Reading
AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS). Continue Reading
Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption. Continue Reading
Evaluate Public Cloud Computing Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Microsoft Office 365 security features are robust, but may not offer the granularity some enterprises need. Expert Dave Shackleford reviews the security pros and cons of Microsoft's cloud-based productivity suite. Continue Reading
Expert Dave Shackleford explains how new cloud firewall management and automation tools can be harnessed to better monitor systems and enact rules. Continue Reading
As business demands and rogue users introduce cloud computing security risks into many enterprises, infosec pros understand they must be enablers. Continue Reading
Manage Public Cloud Computing Security
Learn to apply best practices and optimize your operations.
Understanding the risks of cloud computing is key to protecting a cloud-centric enterprise. Ravila Helen White explains the three must-know dimensions of cloud risk. Continue Reading
Video: Gartner's Jay Heiser says recent attacks on cloud providers show enterprises and business units must manage cloud security requirements. Continue Reading
Expert Ravila Helen White explains how to use visualization to understand what elements form the cloud and how to provide end-to-end cloud protection. Continue Reading
Problem Solve Public Cloud Computing Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Dave Shackleford discusses authentication in the cloud, including details on the multifactor authentication services of major cloud providers. Continue Reading
Expert Dave Shackleford details how to build cloud applications based on typical Web app security flaws and cloud provider tools and platforms. Continue Reading
Expert Dave Shackleford analyzes the likelihood and effects of cross-VM side channel attacks in the cloud and offers mitigations for concerned users. Continue Reading