Cloud Data Storage, Encryption and Data Protection Best Practices
New & Notable
Cloud Data Storage, Encryption and Data Protection Best Practices News
-
October 22, 2019
22
Oct'19
Equifax shares 'risk averse' cloud security model post-breach
Equifax explains how it has transformed its data security strategy using multiple clouds and a more focused approach through Google Cloud Platform's hierarchal security.
-
October 14, 2019
14
Oct'19
Imperva breach update puts blame on exposed AWS API keys
Imperva CTO Kunal Anand posted updated information regarding the recent breach affecting Cloud WAF customers and admitted poor security controls led to the compromise.
-
August 28, 2019
28
Aug'19
Imperva security incident exposes cloud WAF customer data
Imperva told its cloud WAF customers to change passwords and SSL certificates after a security incident exposed data and potentially put customers at risk for further attacks.
-
June 28, 2019
28
Jun'19
Another Amazon S3 leak exposes Attunity data, credentials
UpGuard security researchers found publicly exposed Amazon S3 buckets from data management firm Attunity, which included company credentials and data from enterprise clients.
Cloud Data Storage, Encryption and Data Protection Best Practices Get Started
Bring yourself up to speed with our introductory content
-
How to pass the AWS Certified Security - Specialty exam
Author of 'AWS Certified Security - Specialty Exam Guide' Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of certification. Continue Reading
-
Practice AWS Certified Security - Specialty exam questions
Explore the security and compliance capabilities of the AWS Config service to prepare for the wide-ranging AWS Certified Security - Specialty certification exam. Continue Reading
-
Test your cloud security smarts with these CCSP exam questions
Read up on cloud-based BCDR in this excerpt from Chapter 4 of 'CCSP Certified Cloud Security Professional All-in-One Guide,' then quiz yourself to see what you've learned. Continue Reading
Evaluate Cloud Data Storage, Encryption and Data Protection Best Practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
CASB explained: Know its use cases before you buy
CASB tools help to secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology in a CASB explained tutorial. Continue Reading
-
Editor's picks: Top cybersecurity articles of 2020
As the year no one could have predicted comes to a close, SearchSecurity takes a 30,000-foot view of the cybersecurity trends and challenges that defined the last 12 months. Continue Reading
-
How enterprise cloud VPN protects complex IT environments
Do you know how enterprise cloud VPN differs from a traditional VPN? Explore how cloud VPN works and whether it's the right option for your hybrid IT environment. Continue Reading
Manage Cloud Data Storage, Encryption and Data Protection Best Practices
Learn to apply best practices and optimize your operations.
-
5 PaaS security best practices to safeguard the application layer
Underlying APIs, language choice and cybersecurity features can vary widely across PaaS providers. But these five security best practices can help in almost any PaaS scenario. Continue Reading
-
Tackle multi-cloud key management challenges with KMaaS
Cloud providers' tools for secrets management are not equipped to solve unique multi-cloud key management challenges. Learn how key management-as-a-service tools can fill the gaps. Continue Reading
-
Cybersecurity team structure stronger with 3 new roles
Having the right cybersecurity team in place can help reduce how long it takes to control threats. Consider adding cloud security, third-party risk and digital ethics specialists. Continue Reading
Problem Solve Cloud Data Storage, Encryption and Data Protection Best Practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Prevent cloud account hijacking with 3 key strategies
The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise. Continue Reading
-
An inside look at the CCSP cloud security cert
Get insights into the Certified Cloud Security Professional cert, cloud infrastructure and platform benefits and risks, and more from the author of a CCSP exam guide. Continue Reading
-
Overcome common cloud backup security issues in remote work
Your cloud backup and storage usage may be on the rise. Make sure you take the necessary security precautions detailed here to keep your data protected. Continue Reading