By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Security in the Cloud: Cloud Computing Architecture News
November 28, 2017
In its first big post-Intel move, McAfee agreed to acquire Skyhigh Networks, a leading cloud access security broker, to strengthen its presence in the cloud security market.
November 06, 2017
The latest cloud security tools exemplify the major providers' varied approaches to address user concerns, and protect customers from themselves.
October 13, 2017
Palo Alto Networks' partners can expect to see the company reach out to cloud-focused channel companies and a new public cloud specialization; other news from the week.
July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena. Continue Reading
Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions. Continue Reading
Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The use of cloud microsegmentation in enterprises has been met with some hesitation. Expert Dave Shackleford discusses why there are reservations and what the benefits are. Continue Reading
Cloud security is a high priority for enterprises, but the range of services can be overwhelming. For Azure users, here's a quick cheat sheet of must-know security tools. Continue Reading
New research found that web application attacks present a significant threat to cloud environments. Rob Shapland explains the risks and what enterprises should do about them. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
Skyhigh Networks' Kamal Shah talks with SearchSecurity about how the CASB market has changed and how his company is tackling IaaS platforms and custom applications. Continue Reading
Securing Office 365 properly requires addressing upfront any specific risks of a particular environment and taking advantage of the many security controls Microsoft offers. Continue Reading
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications. Continue Reading
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading