Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud Provisioning and Cloud Identity Management Issues
Cloud browsers: The security benefits of anonymity in the cloud
Cloud browsers can provide a level of security for users seeking anonymity in the cloud. Expert Frank Siemons of the Infosec Institute explains the benefits of cloud browsers. Continue Reading
How TLS mutual authentication for cloud APIs bolsters security
Secure access to cloud APIs is necessary but challenging. One viable option to combat that is TLS mutual authentication, according to expert Ed Moyle. Continue Reading
The Cloud Security Ecosystem
In this excerpt from chapter seven of The Cloud Security Ecosystem, authors Ryan Ko and Kim-Kwang Raymond Choo discuss protecting digital identity in the cloud. Continue Reading
-
How to keep an Amazon S3 bucket from becoming public
A public-facing Amazon S3 bucket caused problems for major organizations, including Booz Allen Hamilton. Expert Rob Shapland explains what happened and how to prevent it. Continue Reading
Why the use of blockchain in the cloud is growing quickly
Blockchain cloud services may offer organizations the ability to shift away from traditional cryptography models. Expert Dave Shackleford discusses what options are available. Continue Reading
How can AWS Organizations help secure cloud accounts?
A new tool called AWS Organizations aims to make cloud account management more secure. Expert Matthew Pascucci explains how the tool works and how it compares to AWS IAM.Continue Reading
How does AWS Directory Service offer security benefits?
AWS has begun providing Active Directory management in the cloud. Expert Dan Sullivan explains this new Amazon service and what it means for users.Continue Reading
Cloud identity management: Deciding on the right approach
Cloud identity management can offer a lot of security benefits, but enterprises need to answer some questions before deployment. Expert Ed Moyle offers advice on what to ask.Continue Reading
Three perspectives on cloud identity and access management
Identity access management (IAM) systems work to help keep security high by initiating, capturing, recording and managing user identities and access permissions. Cloud identity and access management systems can simplify these complex tasks, but ...Continue Reading
How do new AWS APIs simulate IAM policies for cloud security?
The newly released AWS APIs simulate IAM policies for security testing. Expert Dan Sullivan explains how to make the most of these APIs.Continue Reading
-
What security controls does Amazon Elastic File System offer?
Expert Dan Sullivan outlines the security features offered with Amazon Elastic File System and explains why privilege controls are critical to Amazon workload security.Continue Reading
What are the benefits of enterprise cloud bridge usage?
Is a cloud bridge right for your enterprise? Learn what a cloud bridge is and the benefits it can offer, as well as when you might consider using one in the workplace.Continue Reading
Authentication in the cloud: Are more open standards the answer?
Using passwords to authenticate users has a long and troubled past. Expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help solve the woes surrounding user authentication in the cloud.Continue Reading
Cloud authentication: What's the best way to secure cloud credentials?
Cloud credentials can create major vulnerabilities. Expert Dan Sullivan outlines how to detect compromised credentials and the best ways to prevent it.Continue Reading
Ping eyes improved cloud identity security with new platform
At the Cloud Identity Summit this week, Ping introduced a new platform as well as support for the Apple Watch and Yubico's YubiKey.Continue Reading