SearchCloudSecurity
New & Notable
Manage
Cloud storage: Leaks and misconfigurations
Everyone is putting their data in the cloud, from IT staff to department heads. With functionality galore, basic security measures too often go unchecked.
Manage
How EMC security vulnerabilities could affect the cloud
Some EMC and VMware security vulnerabilities could be bad news for the cloud. Expert Dave Shackleford explains the flaws and their potential effect on cloud services.
Evaluate
What to know about cloud mining service providers
Cloud cryptomining as a service is a security risk to users. Expert Frank Siemons discusses cloud mining service providers and what to look out for if you use one.
Evaluate
A look at Amazon's cloud monitoring tool, GuardDuty
The new Amazon GuardDuty aims to secure enterprise AWS accounts and workloads, but does it? Expert Ed Moyle takes a closer look at the tool and whether it's effective.



Download Now: Cloud Incident Response 101
In this free guide, security experts Dave Shackleford, Rob Shapland and Rich Mogull dive into how cloud computing makes incident response more complex and how to respond to modern threats on the cloud.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Trending Topics
-
Private and Hybrid Clouds Get Started
Secure cloud computing requires key skills, knowledge of tools
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena.
-
Public Clouds Problem Solve
The pros and cons of multicloud security
A multicloud deployment takes considerable planning for an enterprise, especially when it comes to security. Expert Dave Shackleford looks at the challenges of multicloud.
-
Data Protection Manage
How EMC security vulnerabilities could affect the cloud
Some EMC and VMware security vulnerabilities could be bad news for the cloud. Expert Dave Shackleford explains the flaws and their potential effect on cloud services.
-
Standards Get Started
Have you mastered the cloud basics? Test your CCSP skills
Preparing to take the CCSP exam? Test your knowledge of key topics in Domain 1, which covers cloud concepts, reference architectures, security concerns and design principles.
-
Virtualization Problem Solve
How to run a secure hypervisor deployment
A hypervisor deployment can put the security of an organization at risk, but there are ways to make it secure. Expert Judith Myerson outlines how to make the process safer.
-
IAM News
Enterprises struggling with IAM in the cloud
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
Topics Covered
-
Cloud Computing Compliance, Audit and Data Governance (6) +
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
-
Cloud Security Management and Cloud Operations Security (6) +
- Cloud Data Storage, Encryption and Data Protection Best Practices
- Cloud Network Security Trends and Tactics
- Cloud Patch Management and Cloud Configuration Management
- Cloud Provisioning and Cloud Identity Management Issues
- Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
- Legacy Application Modernization for the Cloud
-
Security in the Cloud: Cloud Computing Architecture (5) +
Have a question for an expert?
Please add a title for your question
Get answers from your peers on your most technical Cloud Security challenges.
Meet all of our Cloud Security experts
View all Cloud Security questions and answers
Find Solutions For Your Project
-
Evaluate
Options for secure authentication to cloud APIs
Secure access to cloud APIs is necessary but challenging. One viable option to combat that is TLS mutual authentication, according to expert Ed Moyle.
-
What to know about cloud mining service providers
-
A look at Amazon's cloud monitoring tool, GuardDuty
-
Takeaways from an Azure AD Connect service flaw
-
-
Problem Solve
How is GDPR cloud compliance different than on premises?
GDPR compliance in the cloud can be an intimidating concept for some enterprises, but it doesn't have to be. Rob Shapland explains why it's not so different from on premises.
-
SQL injection protection methods in the cloud
-
How to ensure a successful cloud migration
-
How to avoid Google Groups misconfigurations
-
-
Manage
Cloud storage: Leaks and misconfigurations
Everyone is putting their data in the cloud, from IT staff to department heads. With functionality galore, basic security measures too often go unchecked.
-
Threat storm: What's ahead in 2018
-
How EMC security vulnerabilities could affect the cloud
-
Why credential management is crucial to cloud security
-
Cloud Security Basics
-
Get Started
Prepare for the CCSP cloud certification exam: Domain 1
Dive into Domain 1 of the CCSP cloud certification exam, a section of the test that covers architectural concepts and design principles of secure cloud computing.
-
Get Started
Have you mastered the cloud basics? Test your CCSP skills
Preparing to take the CCSP exam? Test your knowledge of key topics in Domain 1, which covers cloud concepts, reference architectures, security concerns and design principles.
-
Get Started
Cloud security risks that should be on your radar
While cloud computing has introduced remarkable efficiencies, cloud security threats continue to pose challenges. Learn where cloud vulnerabilities lie and how to mitigate them.
Vendor Resources
- Cyber Security Survival Kit for Your Business –Video
- 9 Considerations for Securing Web Apps in the Cloud –White Paper
- The Complexities of the Secure DIY Cloud –White Paper
Multimedia
-
-
Get Started
An intro to cloud identity and access management
-
Problem Solve
Extending the CASB model beyond SaaS
-
News
View All -
Cloud Provisioning and Cloud Identity Management Issues
Enterprises struggling with IAM in the cloud
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
-
Cloud Data Storage, Encryption and Data Protection Best Practices
Enterprises' ability to secure the cloud raises doubts
A new study on cloud data security provides insights into the shaken confidence in the cloud. Despite its increased use, payment and customer data still appears to be at risk.
-
Cloud Provisioning and Cloud Identity Management Issues
Cloudflare takes a page from Google's BeyondCorp playbook
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
SearchCloudSecurity Definitions
- Google Cloud Key Management Service (KMS)
- AWS CloudTrail
- cloud access security broker (CASB)
- CAIQ (Consensus Assessments Initiative Questionnaire)
- Microsoft Cloud Security Readiness Tool (CSRT)
- clickwrap agreement (clickthrough agreement or clickwrap license)
- Cloud Controls Matrix
- software-defined perimeter (SDP)