New & Notable
Cloud Computing Compliance, Audit and Data Governance News
June 12, 2018
Security researchers discovered an unsecured Kubernetes console leading to a Weight Watchers exposure, but, allegedly, no personal data was leaked as a result of the issue.
June 08, 2018
Amazon Web Services and Google Groups have seen data exposures due to poor configurations by users. Now, some have accidentally shared passwords on Trello boards.
July 28, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.
May 11, 2017
Organizations have a 'heightened awareness' about increasingly prevalent data protection regulations, and Druva's three new cloud locations aim to aid compliance.
Cloud Computing Compliance, Audit and Data Governance Get Started
Bring yourself up to speed with our introductory content
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. Continue Reading
Review the essential components of a secure cloud infrastructure and learn some tips for managing cloud risks in this SearchSecurity Security School covering Domain 3 of the CCSP exam. Continue Reading
Evaluate Cloud Computing Compliance, Audit and Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud providers may advertise their apps as secure, but it’s up to enterprises to validate those claims and confirm adherence to a secure development lifecycle. Continue Reading
Wouldn't it be nice if every application were 100% cloud-ready? Unfortunately, that's often not the case, which can lead to security risks down the line if not properly addressed. Continue Reading
AWS now operates as its own CA. What are the potential risks of the new Amazon certificate authority services? Expert Dave Shackleford outlines the pros and cons of this new setup. Continue Reading
Manage Cloud Computing Compliance, Audit and Data Governance
Learn to apply best practices and optimize your operations.
After a security breach, incident response practices become crucial to minimize and contain the damage. Learn about incident response frameworks with guest David Geer. Continue Reading
Threat intelligence can facilitate cloud-based malware collection, which has value for enterprise cybersecurity. Expert Frank Siemons discusses collecting and analyzing malware. Continue Reading
Any organization that uses cloud services can learn something from the 2016 Uber data breach. Expert Ed Moyle explains the main takeaways from the massive breach. Continue Reading
Problem Solve Cloud Computing Compliance, Audit and Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With an increase in ransomware attacks involving cities, the need to update incident response plans has become clear. Learn what organizations should do if infected with ransomware. Continue Reading
As the value of bitcoin has risen over the last year, so has the prevalence of cloud cryptojacking attacks. Expert Rob Shapland explains how enterprises can prevent these attacks. Continue Reading
GDPR compliance in the cloud can be an intimidating concept for some enterprises, but it doesn't have to be. Rob Shapland explains why it's not so different from on premises. Continue Reading