New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Security in the Cloud: Cloud Computing Architecture News
January 17, 2018
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
November 28, 2017
In its first big post-Intel move, McAfee agreed to acquire Skyhigh Networks, a leading cloud access security broker, to strengthen its presence in the cloud security market.
November 06, 2017
The latest cloud security tools exemplify the major providers' varied approaches to address user concerns, and protect customers from themselves.
October 13, 2017
Palo Alto Networks' partners can expect to see the company reach out to cloud-focused channel companies and a new public cloud specialization; other news from the week.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena. Continue Reading
Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions. Continue Reading
Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Cloud Security Alliance reported what it found to be the biggest cloud security threats. Expert Rob Shapland looks at how cloud risks compare to on-premises risks. Continue Reading
In 2018, IT security teams will continue to fight to keep their cloud deployments safe. Watch out for these common risks associated with APIs, IoT and human error. Continue Reading
The use of cloud microsegmentation in enterprises has been met with some hesitation. Expert Dave Shackleford discusses why there are reservations and what the benefits are. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
Skyhigh Networks' Kamal Shah talks with SearchSecurity about how the CASB market has changed and how his company is tackling IaaS platforms and custom applications. Continue Reading
Securing Office 365 properly requires addressing upfront any specific risks of a particular environment and taking advantage of the many security controls Microsoft offers. Continue Reading
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications. Continue Reading
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading