SearchCloudSecurity
New & Notable
Manage
The top cloud security certifications for 2021
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
Get Started
What is CIEM and why should CISOs care?
Cloud infrastructure entitlement management offers companies an edge in the cloud permissions gap challenge. Mahendra Ramsinghani explains how CIEM differs from SIEM.
Manage
How to configure AWS, Azure, GCP security policies
Explore cloud security policy configurations in AWS, Azure and GCP using native security tools in this excerpt of 'Multi-Cloud Architecture and Governance' by Jeroen Mulder.
Manage
Enterprise architect explains how to secure multi-cloud
Certified enterprise and security architect Jeroen Mulder explains why multi-cloud security architecture planning should be informed by the business and customer perspectives.
Trending Topics
-
Private and Hybrid Clouds Evaluate
Using a CWPP to secure cloud workloads
VMs and cloud environments make the task of protecting workloads more difficult than ever. Can a cloud workload protection platform help your organization solve the problem?
-
Public Clouds Evaluate
Private vs. public vs. hybrid cloud security
Uncover the differences between private vs. public cloud security -- as well as hybrid cloud security -- before deciding on an enterprise deployment model.
-
Data Protection Manage
The top cloud security certifications for 2021
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
-
Standards Evaluate
Explore the 10 Mitre ATT&CK Cloud Matrix tactics
Learn how to use the Mitre ATT&CK security framework to keep your enterprise cloud environment -- whether AWS, GCP, Azure, Azure AD or Microsoft 365 -- secure.
-
Virtualization Evaluate
In container scanning, consider open source options
Containers have revolutionized app development but pose many security challenges. Uncover how container vulnerability scanning can help and why to consider open source tools.
-
IAM Evaluate
The security battle over entitlements and permissions creep
IT must continually keep track of entitlements and permissions for all their cloud services, with methods such as CI/CD tools, increased visibility and continuous monitoring.
Topics Covered
-
Cloud Computing Compliance, Audit and Data Governance (6) +
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
-
Cloud Security Management and Cloud Operations Security (6) +
- Cloud Data Storage, Encryption and Data Protection Best Practices
- Cloud Network Security Trends and Tactics
- Cloud Patch Management and Cloud Configuration Management
- Cloud Provisioning and Cloud Identity Management Issues
- Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
- Legacy Application Modernization for the Cloud
-
Security in the Cloud: Cloud Computing Architecture (5) +
Find Solutions For Your Project
-
Evaluate
Cloud security management and best practices guide
This cloud security guide explains the challenges facing enterprises today, best practices for securing and managing SaaS, IaaS and PaaS, and comparisons of cloud-native security tools.
-
The security battle over entitlements and permissions creep
-
Private vs. public vs. hybrid cloud security
-
Review these 7 CASB vendors to best secure cloud access
-
-
Problem Solve
11 cloud security threats and how to mitigate them
Before jumping feet-first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them.
-
How to prevent cloud account hijacking attacks
-
CCSP cert advice from the guide's author
-
Pen tester explains how to identify AWS S3 bucket flaws
-
-
Manage
The top cloud security certifications for 2021
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
-
How to configure AWS, Azure, GCP security policies
-
Enterprise architect explains how to secure multi-cloud
-
5 tips to better secure cloud data in 2021
-
Cloud Security Basics
-
Get Started
What is CIEM and why should CISOs care?
Cloud infrastructure entitlement management offers companies an edge in the cloud permissions gap challenge. Mahendra Ramsinghani explains how CIEM differs from SIEM.
-
Get Started
cloud security architecture
Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud.
-
Get Started
cloud security
Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyberthreats and cyber attacks.
Vendor Resources
Multimedia
-
News
View All -
Cloud Provisioning and Cloud Identity Management Issues
McAfee: Attacks on cloud accounts up 630% during COVID-19
Between January and April amid the COVID-19 pandemic, McAfee found usage of cloud collaboration apps and attacks seeking to steal account credentials both skyrocketed.
-
Public Cloud Computing Security
Google Cloud adds Secret Manager to security lineup
Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.
-
Cloud Computing Platform as a Service (PaaS) Security
250M Microsoft customer service records exposed
Microsoft exposed 250 million customer support records on five Elasticsearch servers that had misconfigured Azure security rules, a Comparitech security research team found.
SearchCloudSecurity Definitions
- cloud security architecture
- cloud security
- Cloud Security Posture Management (CSPM)
- cloud access security broker (CASB)
- software-defined perimeter (SDP)
- hypervisor security
- clickwrap agreement (clickthrough agreement)
- SSAE 16