New & Notable
Cloud Provisioning and Cloud Identity Management Issues News
February 04, 2020
HPE has scooped up Scytale, a startup that has developed a cloud-native security framework for highly distributed applications. While most enterprises don't need such capabilities today, HPE has taken a step that could serve them down the road.
January 24, 2020
Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.
December 03, 2019
Amazon Web Services introduced the Access Analyzer tool at its re:Invent event. The new option aims to help users avoid accidentally exposing data stored in S3 buckets.
August 08, 2019
Micro Focus security researchers demonstrated a new technique, dubbed 'dupe key confusion,' which allows threat actors to bypass Microsoft's SAML token validation.
Cloud Provisioning and Cloud Identity Management Issues Get Started
Bring yourself up to speed with our introductory content
The nature of cloud environments and workloads is changing. Security team approaches must evolve in response. Learn how to implement zero-trust cloud security from expert Dave Shackleford. Continue Reading
Explore how the security blast radius concept, which has admins evaluating how to assess and limit the damage of a threat, can be applied to cloud identity and access management. Continue Reading
With help from the Azure PowerShell module, you can avoid login prompts and automate the authentication process when using service principals on Microsoft's cloud platform. Continue Reading
Evaluate Cloud Provisioning and Cloud Identity Management Issues Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Experts suggest enterprises consider identity as a service as organizations' data management needs grow and access management becomes more complex. Continue Reading
Microsoft's cloud-based Active Directory has different features than the on-premises version, and you'll need to do your homework to decide which premium version is a better fit. Continue Reading
Cloud browsers can provide a level of security for users seeking anonymity in the cloud. Expert Frank Siemons of the Infosec Institute explains the benefits of cloud browsers. Continue Reading
Manage Cloud Provisioning and Cloud Identity Management Issues
Learn to apply best practices and optimize your operations.
Adopting a zero-trust environment was the right move for GitLab, according to the company's former security chief, but it may not be well suited for all enterprises. Continue Reading
A locked-down cloud control plane is integral to maintaining cloud security, especially in multi-cloud environments. Here are five steps to a secure cloud control plane. Continue Reading
IAM is foundational to cybersecurity, but the latest systems use biometrics and other personal data. Learn how to cope with the resulting compliance and privacy issues. Continue Reading
Problem Solve Cloud Provisioning and Cloud Identity Management Issues Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Not handling configuration management in the cloud correctly can unintentionally expose sensitive enterprise data. Expert Ed Moyle explains how to make sure this doesn't happen. Continue Reading
Enterprises using the cloud should be particularly careful to avoid an insider data breach. Expert Frank Siemons explains why it's important to stop insider threats in the cloud. Continue Reading
A cloud IAM policy is crucial to protecting an organization from external and internal threats. Expert Rob Shapland discusses how to bolster cloud IAM. Continue Reading