SearchCloudSecurity

New & Notable

Problem Solve

What to do about malicious IPs hidden in the cloud

Cybercriminals have found a way to use the cloud to mask their locations. Expert Rob Shapland looks at the options organizations have to deal with malicious IP addresses.

Evaluate

A look at the security of cloud databases

Unsecured Google Firebase databases are similar to misconfigured AWS S3 buckets, but there are key differences. Expert Rob Shapland discusses the risks of unsecured cloud databases.

Manage

How to eliminate public access to AWS S3 buckets

AWS S3 buckets leaked millions of files, including sensitive data, by enabling public access. Learn how to block public access with expert David Shackleford.

Manage

How a cloud-based honeypot bolsters security

A cloud honeypot can help enterprises gather threat intelligence. Expert Frank Siemons explains why a cloud-based honeypot deployment is preferable to a traditional one.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    The security pros and cons of Cloudflare Workers

    Cloudflare Workers is new for serverless cloud computing and introduces benefits and drawbacks for security professionals. Expert Ed Moyle discusses the security side of serverless.

  • Get Started

    Three issues with cloud security and how to fix them

    Enterprises can face an array of issues when they migrate to the cloud. Learn about three of the main challenges and how to effectively create a cloud security strategy.

  • Get Started

    software-defined perimeter

    Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Patch Management and Cloud Configuration Management

    First big Kubernetes security vulnerability discovered

    News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.

  • Cloud Computing Compliance, Audit and Data Governance

    Palo Alto bolsters cloud with security startup RedLock

    Palo Alto Networks looks to bolster its cloud security portfolio with a $173 million acquisition of cloud security startup RedLock and integrate it with Evident.io technologies.

  • Cloud Provisioning and Cloud Identity Management Issues

    Netflix shares new approach for monitoring credentials in AWS

    At Black Hat 2018, a Netflix security engineer introduced a new open source tool designed to more effectively monitor AWS credentials in large cloud environments, like Netflix's.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close