Cloud Computing Compliance, Audit and Data Governance News
June 01, 2021
SearchSecurity will be at RSAC 2021, virtual edition, to provide pre-conference coverage and breaking news and analysis from the world's biggest infosec event.
January 20, 2021
The new tool, dubbed Azure AD Investigator, will help audit Microsoft 365 environments for techniques used by the nation-state actors behind the SolarWinds supply chain attack.
April 22, 2020
New research by Trustwave shows 2019 saw huge increases in ransomware and cloud services attacks, as well as a big shift from spam toward business email compromise.
February 10, 2020
GoodData says it is complying with the California Consumer Privacy Act. Meanwhile, founder and CEO Roman Stanek talks about why complexity is a key challenge for data analytics.
Cloud Computing Compliance, Audit and Data Governance Get Started
Bring yourself up to speed with our introductory content
Want to boost your organization's ability to fight cybersecurity threats? Uncover the essentials to creating an incident response plan and download our free, editable template. Continue Reading
Cloud security architecture is a security strategy designed around securing an organization's data and applications in the cloud. Continue Reading
Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications and infrastructure from cyberthreats and cyber attacks. Continue Reading
Evaluate Cloud Computing Compliance, Audit and Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security professionals often compare containers vs. VMs when determining whether virtualization or containerization is better for their company's security strategy. Continue Reading
Safeguarding public cloud environments is a shared responsibility. Cloud customers should use CIS benchmarks to ensure cloud security at the account level. Continue Reading
Learn actionable incident response strategies that your IT and enterprise security teams can use to meet today's security threats and vulnerabilities more effectively. Continue Reading
Manage Cloud Computing Compliance, Audit and Data Governance
Learn to apply best practices and optimize your operations.
Understanding the incident response framework standards and how to build the best framework for your organization is essential to preventing threats and mitigating cyber incidents. Continue Reading
Common security threats range from insider threats to advanced persistent threats, and they can bring an organization to its knees unless its in-house security team is aware of them and ready to respond. Continue Reading
Booz Allen's Jimmy Pham and Brad Beaulieu dispel four major cloud security myths, exploring why staying in the cloud rather than returning to on premises may be the more secure option. Continue Reading
Problem Solve Cloud Computing Compliance, Audit and Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Check out the top five cybersecurity vulnerabilities and find out how to prevent data loss or exposure, whether the problem is end-user gullibility, inadequate network monitoring or poor endpoint security defenses. Continue Reading
What's in a name? Parse the true differences between a CERT, a CSIRT, a CIRT and a SOC, before you decide what's best for your organization. Continue Reading
Before jumping feet-first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. Continue Reading