SearchCloudSecurity

New & Notable

Get Started

Adapting zero-trust security for the cloud

Zero-trust security in the cloud is different than it is on premises. Learn the concepts and policies to effectively achieve a zero-trust model in the cloud.

Evaluate

How cloud VPN works to protect hybrid deployments

Do you know how enterprise cloud VPN differs from a traditional VPN? Explore how cloud VPN works and whether it's the right option for your hybrid IT environment.

Evaluate

Understanding CASB vs. CSPM vs. CWPP

Complexity has introduced new needs and challenges when securing cloud environments. Find out how CASB, CSPM and CWPP tools have evolved to meet the changing cloud landscape.

Problem Solve

How to prevent cloud account hijacking attacks

The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    Adapting zero-trust security for the cloud

    Zero-trust security in the cloud is different than it is on premises. Learn the concepts and policies to effectively achieve a zero-trust model in the cloud.

  • Get Started

    cloud access security broker

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.

  • Get Started

    CCSP BCDR practice exam questions

    Read up on cloud-based BCDR in this excerpt from Chapter 4 of 'CCSP Certified Cloud Security Professional All-in-One Guide,' then quiz yourself to see what you've learned.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchCloudSecurity

SearchSecurity

SearchCloudComputing

SearchAWS

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close