SearchCloudSecurity

New & Notable

Manage

Cloud storage: Leaks and misconfigurations

Everyone is putting their data in the cloud, from IT staff to department heads. With functionality galore, basic security measures too often go unchecked.

Manage

How EMC security vulnerabilities could affect the cloud

Some EMC and VMware security vulnerabilities could be bad news for the cloud. Expert Dave Shackleford explains the flaws and their potential effect on cloud services.

Evaluate

What to know about cloud mining service providers

Cloud cryptomining as a service is a security risk to users. Expert Frank Siemons discusses cloud mining service providers and what to look out for if you use one.

Evaluate

A look at Amazon's cloud monitoring tool, GuardDuty

The new Amazon GuardDuty aims to secure enterprise AWS accounts and workloads, but does it? Expert Ed Moyle takes a closer look at the tool and whether it's effective.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Cloud Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Cloud Security Basics

  • Get Started

    Security technologies every CCSP should know

    While the cloud presents new challenges, many data security technologies used in it are wholly familiar. Learn more about which tool best suits each phase of the data lifecycle.

  • Get Started

    The three pillars of data protection in the cloud

    How should the use of cloud services affect your data retention, deletion and archiving practices? Find out what guidelines enterprises should be following to protect cloud data.

  • Get Started

    Detecting and preventing cloud backdoors

    Cloud backdoors pose a rising threat to enterprises, according to new research. Expert Ed Moyle explains what a cloud backdoor is and what mitigation options are available.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchCloudSecurity

  • News

    View All
  • Public Cloud Computing Security

    SentinelOne CEO on limiting lateral movement in clouds

    At RSA Conference 2018, SentinelOne CEO Tomer Weingarten talks with SearchSecurity about his company's shift to the cloud and what it means for endpoint security.

  • Cloud Provisioning and Cloud Identity Management Issues

    How hackers use cloud IAM systems to their advantage

    At RSA Conference 2018, CyberArk researchers described how threat actors are able to gain access to cloud environments and elevate privileges through 'shadow admins.'

  • Cloud Provisioning and Cloud Identity Management Issues

    Enterprises struggling with IAM in the cloud

    Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close