SearchCloudSecurity

New & Notable

News

AWS exposure includes 1 TB of Attunity backups

UpGuard security researchers found publicly exposed Amazon S3 buckets from data management firm Attunity, which included company credentials and data from enterprise clients.

News

AWS re:Inforce addresses accidental data exposures

AWS re:Inforce, the cloud provider's inaugural security conference, addressed the problems of misconfigurations and data exposures with new tools, like Control Tower.

Get Started

Everything you need to know about multi-cloud security

Make multi-cloud security a reality in your organization with these tips and strategies from industry experts as you implement more cloud platforms.

Get Started

How to write a cloud security policy

Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these policy writing best practices.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Data Storage, Encryption and Data Protection Best Practices

    AWS exposure includes 1 TB of Attunity backups

    UpGuard security researchers found publicly exposed Amazon S3 buckets from data management firm Attunity, which included company credentials and data from enterprise clients.

  • Cloud Patch Management and Cloud Configuration Management

    AWS re:Inforce addresses accidental data exposures

    AWS re:Inforce, the cloud provider's inaugural security conference, addressed the problems of misconfigurations and data exposures with new tools, like Control Tower.

  • Cloud Computing Platform as a Service (PaaS) Security

    Threat Stack adds application security monitoring to platform

    Threat Stack Application Security Monitoring will bring security, visibility and protection to cloud-based architecture and applications, according to the vendor.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close