New & Notable
Cloud Computing Compliance, Audit and Data Governance News
December 07, 2018
News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.
October 04, 2018
Palo Alto Networks looks to bolster its cloud security portfolio with a $173 million acquisition of cloud security startup RedLock and integrate it with Evident.io technologies.
June 12, 2018
Security researchers discovered an unsecured Kubernetes console leading to a Weight Watchers exposure, but, allegedly, no personal data was leaked as a result of the issue.
June 08, 2018
Amazon Web Services and Google Groups have seen data exposures due to poor configurations by users. Now, some have accidentally shared passwords on Trello boards.
Cloud Computing Compliance, Audit and Data Governance Get Started
Bring yourself up to speed with our introductory content
The Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is a set of auditing standards and guidance on using the standards, published by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (... Continue Reading
Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue Reading
This Security School will help you prepare for Domain 6 of the CCSP exam, "Legal and Compliance," which covers cloud computing regulations, privacy issues and legal requirements. Continue Reading
Evaluate Cloud Computing Compliance, Audit and Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Remote access puts Docker APIs in a vulnerable position. Expert Dave Shackleford explains how hackers abuse Docker APIs to carry out cryptojacking attacks. Continue Reading
The Google Asylo framework is an open source alternative for confidential computing. Expert Rob Shapland explains how it works and how it's different from other offerings. Continue Reading
While you may not have much control over the infrastructure used by cloud service providers, you’re not completely at their mercy when it comes to cloud risk management. Continue Reading
Manage Cloud Computing Compliance, Audit and Data Governance
Learn to apply best practices and optimize your operations.
Data center compliance is a moving target that shifts with standards and technologies. Don't get sidetracked by the complexity -- prioritize performance while maintaining compliance. Continue Reading
Conducting a risk assessment before moving to the cloud and establishing security controls when you get there are key steps toward achieving cloud security, experts say. Continue Reading
After a security breach, incident response practices become crucial to minimize and contain the damage. Learn about incident response frameworks with guest David Geer. Continue Reading
Problem Solve Cloud Computing Compliance, Audit and Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With an increase in ransomware attacks involving cities, the need to update incident response plans has become clear. Learn what organizations should do if infected with ransomware. Continue Reading
As the value of bitcoin has risen over the last year, so has the prevalence of cloud cryptojacking attacks. Expert Rob Shapland explains how enterprises can prevent these attacks. Continue Reading
GDPR compliance in the cloud can be an intimidating concept for some enterprises, but it doesn't have to be. Rob Shapland explains why it's not so different from on premises. Continue Reading