May 2017
-
May 31, 2017
31
May'17
How CASBs are broadening to address IaaS security
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading
-
May 24, 2017
24
May'17
Four common cloud attacks and how to prepare for them
Cloud attacks are increasingly targeting service providers. Expert Frank Siemons looks at the different types of attacks from which service providers and enterprises should be protected. Continue Reading
-
May 17, 2017
17
May'17
How DevOps tools can be used to integrate cloud automation
DevOps tools can be used to deploy secure cloud automation. Expert Dave Shackleford looks at how this works and which tools are the best bet for DevSecOps. Continue Reading
-
May 11, 2017
11
May'17
How can enterprises use SOC 2 reports to evaluate cloud providers?
Enterprises can use SOC 2 reports to evaluate cloud service providers. Expert Matthew Pascucci discusses the effectiveness of doing so, and what else companies can use. Continue Reading
-
May 10, 2017
10
May'17
Cloud privacy: Baseline features and emerging techniques
Achieving cloud privacy can be a lofty task for enterprises, but it's not as impossible as it seems. Expert Ed Moyle outlines how to keep cloud data private with newer techniques. Continue Reading
-
May 03, 2017
03
May'17
How hackers use Google cloud services to attack enterprises
Hackers, such as the Carbanak group, use Google cloud services to infiltrate organizations' systems. Expert Rob Shapland explains how that works and what can be done to stop it. Continue Reading