SearchCloudSecurity

New & Notable

News

First big Kubernetes security vulnerability discovered

News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.

Evaluate

A look at Google's confidential computing framework

The Google Asylo framework is an open source alternative for confidential computing. Expert Rob Shapland explains how it works and how it's different from other offerings.

Evaluate

Possible disposable sandboxes rival virtualization

Microsoft's secretive, potential new feature InPrivate Desktop could give security teams access to disposable sandboxes. Expert Ed Moyle explains how the feature could work.

Get Started

Why the Google data deletion process matters

Understanding the process behind Google's cloud data deletion can help influence stronger enterprise security policies. Expert Ed Moyle explains the process and how to use it.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    SSAE 16

    The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of auditing standards and guidance on using the standards, published by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (...

  • Get Started

    Why the Google data deletion process matters

    Understanding the process behind Google's cloud data deletion can help influence stronger enterprise security policies. Expert Ed Moyle explains the process and how to use it.

  • Get Started

    How to set up a virtual network TAP in the cloud

    A vTAP can give enterprises better visibility into their cloud networks. Expert Frank Siemons of InfoSec Institute explains how virtual network TAPs work and the available options.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchCloudSecurity

  • News

    View All
  • Cloud Patch Management and Cloud Configuration Management

    First big Kubernetes security vulnerability discovered

    News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.

  • Cloud Computing Compliance, Audit and Data Governance

    Palo Alto bolsters cloud with security startup RedLock

    Palo Alto Networks looks to bolster its cloud security portfolio with a $173 million acquisition of cloud security startup RedLock and integrate it with Evident.io technologies.

  • Cloud Provisioning and Cloud Identity Management Issues

    Netflix shares new approach for monitoring credentials in AWS

    At Black Hat 2018, a Netflix security engineer introduced a new open source tool designed to more effectively monitor AWS credentials in large cloud environments, like Netflix's.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close