New & Notable
Cloud Computing Compliance, Audit and Data Governance News
May 29, 2019
Human rights advocate Bjørn Stormorken talks about the importance of data privacy laws, and why stronger laws and more data literacy are necessary today.
December 07, 2018
News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.
October 04, 2018
Palo Alto Networks looks to bolster its cloud security portfolio with a $173 million acquisition of cloud security startup RedLock and integrate it with Evident.io technologies.
June 12, 2018
Security researchers discovered an unsecured Kubernetes console leading to a Weight Watchers exposure, but, allegedly, no personal data was leaked as a result of the issue.
Cloud Computing Compliance, Audit and Data Governance Get Started
Bring yourself up to speed with our introductory content
Want to boost your organization's ability to fight cybersecurity threats? Learn the essentials to creating an incident response plan and download our free, editable template. Continue Reading
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and ... Continue Reading
Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue Reading
Evaluate Cloud Computing Compliance, Audit and Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Remote access puts Docker APIs in a vulnerable position. Expert Dave Shackleford explains how hackers abuse Docker APIs to carry out cryptojacking attacks. Continue Reading
The Google Asylo framework is an open source alternative for confidential computing. Expert Rob Shapland explains how it works and how it's different from other offerings. Continue Reading
While you may not have much control over the infrastructure used by cloud service providers, you’re not completely at their mercy when it comes to cloud risk management. Continue Reading
Manage Cloud Computing Compliance, Audit and Data Governance
Learn to apply best practices and optimize your operations.
Achieving cloud security today demands you continually update your strategy, policy, tactics and tools. This collection of expert advice helps keep your cloud defenses well-tuned. Continue Reading
Cloud security monitoring can be laborious to set up, but organizations can make it easier. Learn about three best practices for cloud security monitoring and the available tools. Continue Reading
Hackers are after your assets in the cloud. Here's how they get in and what you can do to plug security holes, starting with minimizing the risks created through human error. Continue Reading
Problem Solve Cloud Computing Compliance, Audit and Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As container security vulnerabilities continue to emerge, companies should plan ahead and have strategies ready to defend against looming segmentation failures. Continue Reading
Cybercriminals have found a way to use the cloud to mask their locations. Expert Rob Shapland looks at the options organizations have to deal with malicious IP addresses. Continue Reading
With an increase in ransomware attacks involving cities, the need to update incident response plans has become clear. Learn what organizations should do if infected with ransomware. Continue Reading