SearchCloudSecurity
New & Notable
Evaluate
Review these 7 CASB vendors to best secure cloud access
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these seven vendors stack up and protect access to cloud applications.
Evaluate
CASB explained: Know its use cases before you buy
CASB tools help to secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology in a CASB explained tutorial.
Get Started
How to build a cloud-focused IAM team
Building a cloud IAM team with the necessary technical expertise and soft skills is key to securely managing IAM in complex cloud environments.
Manage
How to modernize enterprise multi-cloud security
Enterprise security best practices must account for changes in cloud landscapes. Learn how to overcome such challenges and bolster multi-cloud security with technology and policy.
Trending Topics
-
Private and Hybrid Clouds Evaluate
Using a CWPP to secure cloud workloads
VMs and cloud environments make the task of protecting workloads more difficult than ever. Can a cloud workload protection platform help your organization solve the problem?
-
Public Clouds News
Google Cloud adds Secret Manager to security lineup
Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.
-
Data Protection Manage
Multi-cloud key management-as-a-service capabilities
Cloud providers' tools for secrets management are not equipped to solve unique multi-cloud key management challenges. Learn how key management-as-a-service tools can fill the gaps.
-
Standards Evaluate
Explore the 10 Mitre ATT&CK Cloud Matrix tactics
Learn how to use the Mitre ATT&CK security framework to keep your enterprise cloud environment -- whether AWS, GCP, Azure, Azure AD or Microsoft 365 -- secure.
-
Virtualization Evaluate
In container scanning, consider open source options
Containers have revolutionized app development but pose many security challenges. Uncover how container vulnerability scanning can help and why to consider open source tools.
-
IAM Get Started
How to build a cloud-focused IAM team
Building a cloud IAM team with the necessary technical expertise and soft skills is key to securely managing IAM in complex cloud environments.
Topics Covered
-
Cloud Computing Compliance, Audit and Data Governance (6) +
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
-
Cloud Security Management and Cloud Operations Security (6) +
- Cloud Data Storage, Encryption and Data Protection Best Practices
- Cloud Network Security Trends and Tactics
- Cloud Patch Management and Cloud Configuration Management
- Cloud Provisioning and Cloud Identity Management Issues
- Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
- Legacy Application Modernization for the Cloud
-
Security in the Cloud: Cloud Computing Architecture (5) +
Find Solutions For Your Project
-
Evaluate
Review these 7 CASB vendors to best secure cloud access
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these seven vendors stack up and protect access to cloud applications.
-
CASB explained: Know its use cases before you buy
-
How SASE and zero trust work together
-
Explore cloud-based SIEM features and benefits
-
-
Problem Solve
How to prevent cloud account hijacking attacks
The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise.
-
CCSP cert advice from the guide's author
-
Pen tester explains how to identify AWS S3 bucket flaws
-
Advice for AWS pen testers from a cloud security pro
-
-
Manage
Use this SaaS security checklist to defend applications
Use these SaaS security best practices to ensure your users' and organization's SaaS use stays as protected as the rest of your enterprise applications.
-
How to modernize enterprise multi-cloud security
-
Multi-cloud key management-as-a-service capabilities
-
How to build a cloud-ready SOC team
-
Cloud Security Basics
-
Get Started
cloud access security broker
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
-
Get Started
How to build a cloud-focused IAM team
Building a cloud IAM team with the necessary technical expertise and soft skills is key to securely managing IAM in complex cloud environments.
-
Get Started
An inside look at the AWS Certified Security - Specialty exam
Author of 'AWS Certified Security - Specialty Exam Guide' Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of certification.
Vendor Resources
Multimedia
-
News
View All -
Cloud Provisioning and Cloud Identity Management Issues
McAfee: Attacks on cloud accounts up 630% during COVID-19
Between January and April amid the COVID-19 pandemic, McAfee found usage of cloud collaboration apps and attacks seeking to steal account credentials both skyrocketed.
-
Public Cloud Computing Security
Google Cloud adds Secret Manager to security lineup
Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.
-
Cloud Computing Platform as a Service (PaaS) Security
250M Microsoft customer service records exposed
Microsoft exposed 250 million customer support records on five Elasticsearch servers that had misconfigured Azure security rules, a Comparitech security research team found.
SearchCloudSecurity Definitions
- cloud access security broker (CASB)
- software-defined perimeter (SDP)
- hypervisor security
- clickwrap agreement (clickthrough agreement)
- SSAE 16
- CAIQ (Consensus Assessments Initiative Questionnaire)
- virtual firewall
- Cloud Security Alliance (CSA)