-
Article
Face the challenges of secure cloud access control
Don't store identity and access data in the cloud without first taking secure cloud access control seriously. Expert Rob Shapland explains the security considerations for enterprises. Read Now
-
Article
Enterprise identity management tools keep cloud hackers at bay
Bringing new application types and integration points into the enterprise, cloud can complicate user identity management. So, how can you be sure your data is secure? Read Now
-
Article
What enterprises need to know about cloud IAM before implementation
Cloud IAM services are growing in popularity among enterprises, but it's not a simple implementation. Expert Matthew Pascucci explains what to know before using a cloud IAM service. Read Now
-
Article
How to get started with IAM services in the cloud
Security is critical in the cloud, so it isn't surprising that identity and access management services are in high demand. Learn why you need IAM, and what services to consider. Read Now
Editor's note
Cloud is now accepted as a dominant force in IT and secure cloud computing is essential to every business. This guide provides the essentials infosec pros need now to understand both the risks of cloud and how to manage them successfully.
Learn what key tools and skills are necessary, from identity and access management for securing cloud to the latest certifications available. This guide will get any infosec pointed in the right direction in order to launch and maintain a security career and keep company systems and data secure, even when it all seems to be up in the cloud.
1Securing apps in the cloud
Complicating any strategy for secure cloud computing is the ubiquitous app. There truly is an app for everything now, and employees logging on to company networks and using corporate data very often use custom applications to do so. The articles collected here can help teach you how to tackle the security concerns that cloud apps inevitably bring.
-
Article
The security challenges of custom applications in the cloud
Securing custom applications in the cloud can be a hassle for enterprises. Expert Ed Moyle discusses how to make it easier to secure custom cloud apps. Read Now
-
Article
CSA: Custom applications creating new 'shadow cloud computing' risks
The Cloud Security Alliance unveiled new research at RSA Conference 2017 that shows custom enterprise applications are creating shadow cloud computing risks for organizations. Read Now
-
Blog
New security threat: Custom applications in the cloud
New research shows that custom applications in the cloud are running more core business functions today -- without IT security knowing about it. Read Now
-
Article
How can cloud access security brokers improve enterprise security?
Cloud access security brokers can help enterprises enforce security policies in the cloud. Expert Dan Sullivan discusses the benefits. Read Now
-
Article
Prevent ransomware threats to cloud apps with backup, security tools
As ransomware attacks become more sophisticated, cloud-based applications are at risk. Use continuous backup and educate end users to protect your data and apps. Read Now
2The role of DevOps in secure cloud computing
The DevOps approach to creating new software is in use everywhere and the importance of including security in the process is now widely acknowledged. In this section, learn about the key security concerns DevOps entails, where cloud visibility comes in and more. It's possible to deliver cloud apps securely, but understanding the risks and strategizing to minimize them are essential first steps.
-
Article
Avoiding the most common DevOps security vulnerabilities in the cloud
When applying DevOps principles, like continuous automation and continuous delivery, many organizations are creating DevOps security vulnerabilities in their public cloud. Read Now
-
Article
Delivering mobile apps through enterprise app stores and private clouds
The influx of mobile devices and apps has given IT departments a new mandate: Securely and efficiently deliver mobile apps to end users. Read Now
-
Article
Avoiding the most common DevOps security vulnerabilities in the cloud
When applying DevOps principles, like continuous automation and continuous delivery, many organizations are creating DevOps security vulnerabilities in their public cloud. Read Now
-
Article
Cloud visibility: Manage DevOps and other vulnerabilities
Help is on the way. Companies moving to public cloud infrastructure try out a new crop of cloud visibility tools to monitor configurations and security policy. Read Now
-
Article
Effective DevOps change management for versioning cloud apps
There are many ways to go about versioning your cloud applications, but new approaches may need to be implemented when performing DevOps change management. Read Now
3Upping your cloud security skill set
Possessing certain skills is essential for a infosec career now. The ability to set up and manage IT security tools that, among other things, deliver secure cloud computing to a company is a skill employers demand. Get up to date on the key cloud security certifications and skills companies are seeking now, and prep for your next interview by reviewing the material in this segment.
-
Video
Designing comprehensive cloud computing security controls
CCSP Domain 3: Multiple layers of cloud security controls mitigate risk Watch Now
-
Article
A guide to cloud security certifications for infosec pros
Both vendor-neutral and vendor-specific cloud security certifications have emerged as businesses shift toward cloud computing models that reduce TCO and expand computing capacity. Read Now
-
Article
Four common cloud attacks and how to prepare for them
Cloud attacks are increasingly targeting service providers. Expert Frank Siemons looks at the different types of attacks from which service providers and enterprises should be protected. Read Now
-
Article
How to use a cloud-based sandbox to analyze malware
A cloud-based sandbox can be a helpful tool for enterprises looking to bolster their intrusion prevention systems. Expert Rob Shapland explains how to leverage this technology. Read Now
-
Article
Prepare for your next cloud security manager interview
When interviewing for a cloud security manager position, candidates should be ready to talk about everything, from encryption technology to DevOps. Read Now
-
Article
People with non-IT backgrounds could help fill cyber security skills gap
Organisations should look to fill cyber security roles with people who are curious and have work experience rather than focusing solely on graduates Read Now