New & Notable
Cloud Computing Compliance, Audit and Data Governance News
April 22, 2020
New research by Trustwave shows 2019 saw huge increases in ransomware and cloud services attacks, as well as a big shift from spam toward business email compromise.
March 24, 2020
What's happening at the 2020 RSA Conference? Our team keeps you up to date with pre-conference coverage and breaking news from the infosec world's biggest event.
February 10, 2020
GoodData says it is complying with the California Consumer Privacy Act. Meanwhile, founder and CEO Roman Stanek talks about why complexity is a key challenge for data analytics.
July 19, 2019
CyberArk introduces CyberArk Alero to its privileged access management product lineup, in addition to other endpoint management and cloud offering updates.
Cloud Computing Compliance, Audit and Data Governance Get Started
Bring yourself up to speed with our introductory content
An organization that wants to control its cloud environment should look closely at how well it adheres to these four key pillars of cloud governance. Continue Reading
Zero-trust security in the cloud is different than it is on premises. Learn the concepts and policies to effectively achieve a zero-trust model in the cloud. Continue Reading
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
Evaluate Cloud Computing Compliance, Audit and Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Secure Access Service Edge is the latest technology to garner industry buzz in networking and security. Although it's still relatively new, the technology is making waves. Continue Reading
Implementing privacy-preserving machine learning controls, such as federated learning and homomorphic encryption, can address top cloud security and privacy concerns. Learn how. Continue Reading
Learn more about Istio service mesh security features and how the open source technology can enable developers to better run, control and secure a distributed microservices architecture. Continue Reading
Manage Cloud Computing Compliance, Audit and Data Governance
Learn to apply best practices and optimize your operations.
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal. Continue Reading
Data sovereignty regulations combined with a tsunami of data growth and increased cloud usage have created a perfect storm for enterprises. Follow these steps to ensure compliance. Continue Reading
Data destruction is a topic that has been poorly covered until recently. Regardless of which cloud service provider you use, this review of the top three CSPs' data destruction documentation should improve your due diligence. Continue Reading
Problem Solve Cloud Computing Compliance, Audit and Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise. Continue Reading
Attention AWS pen testers: The trick to understanding the indicators of AWS S3 bucket vulnerabilities is setting up an insecure bucket. Learn how in this actionable guide. Continue Reading
Security researcher Benjamin Caudill shares details from his book, 'Hands-On AWS Penetration Testing with Kali Linux,' and advice on Amazon S3 bucket pen testing for ethical hackers. Continue Reading