Cloud Security Management and Cloud Operations Security
New & Notable
Cloud Security Management and Cloud Operations Security News
-
February 08, 2019
08
Feb'19
Google eyes confidential computing to buff cloud security cred
Google Cloud Platform's Asylo open source project could one day boost confidential computing efforts, but for now it mainly serves to boost Google's security bona fides.
-
January 23, 2019
23
Jan'19
Google GDPR fine of $57 million sets record
The Google GDPR fine of $57 million marks the first time a major tech company has been penalized under Europe's new privacy regulations. But the fine is less than the maximum allowable penalty.
-
December 20, 2018
20
Dec'18
GCP addition targets cloud data access, privacy fears
Google Cloud Platform's Access Approval feature lets customers use more of the data access controls they have in their on-premises infrastructure.
-
December 07, 2018
07
Dec'18
Critical Kubernetes vulnerability could have widespread effects
News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.
Cloud Security Management and Cloud Operations Security Get Started
Bring yourself up to speed with our introductory content
-
Software as a Service (SaaS)
Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet. Continue Reading
-
How much does Azure Update Management cost?
The Azure Update Management cost is free, but organizations that require the tool's advanced features might have to contend with additional fees. Continue Reading
-
software-defined perimeter (SDP)
Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue Reading
Evaluate Cloud Security Management and Cloud Operations Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Top 10 CISO concerns for 2019 span a wide range of issues
From dealing with data and staffing shortages to adapting to an ever-expanding set of job responsibilities, CISOs face an array of serious issues in 2019. Continue Reading
-
Infoblox's Cricket Liu explains DNS over HTTPS security issues
Cricket Liu, chief DNS architect at Infoblox, explains how DNS over HTTPS and DNS over TLS improve security, as well as challenges the new protocols may soon raise for enterprises. Continue Reading
-
How unsecured Firebase databases put critical data at risk
Unsecured Google Firebase databases are similar to misconfigured AWS S3 buckets, but there are key differences. Expert Rob Shapland discusses the risks of unsecured cloud databases. Continue Reading
Manage Cloud Security Management and Cloud Operations Security
Learn to apply best practices and optimize your operations.
-
CISO tackles banking cybersecurity and changing roles
Over the course of his career in security, Thomas Hill has held varied positions that inform his views on both technological specifics and strategic roles in modern corporations. Continue Reading
-
How to block public access for AWS S3 bucket security
AWS S3 buckets leaked millions of files, including sensitive data, by enabling public access. Learn how to block public access with expert David Shackleford. Continue Reading
-
What's the best multi-cloud storage strategy for minimizing risks?
Find out the steps to take to construct a unified multi-cloud security strategy where components work together to provide a single, comprehensive approach. Continue Reading
Problem Solve Cloud Security Management and Cloud Operations Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Addressing vulnerable web systems that are often overlooked
Web security vulnerability scanners often focus on large applications within the enterprise. However, there are plenty of overlooked web systems that contain hidden flaws. Continue Reading
-
Antivirus tools: Are two programs better than one?
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program. Nick Lewis explains why. Continue Reading
-
Katyusha Scanner: How does it work via a Telegram account?
The Katyusha Scanner is based on the open source penetration test scanner Arachni. However, it has been modified to work through Telegram accounts. Nick Lewis explains how it works. Continue Reading