New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Cloud Security Management and Cloud Operations Security News
April 17, 2018
Why are enterprises still struggling with identity and access management in the cloud? Experts at RSA Conference discuss the issue and the risks posed by compromised credentials.
April 06, 2018
Researchers found misconfigured cloud storage across multiple platforms left huge amounts of data exposed, including medical information and payroll data.
March 23, 2018
Google Cloud Platform upgrades provide deeper protection and visibility for enterprise assets in the cloud, as organizations increasingly mull multi-cloud options.
February 22, 2018
Container security startups peddle unique approaches, but while some early adopters jump on board with fledgling vendors, a majority will watch for industry consolidation first.
Cloud Security Management and Cloud Operations Security Get Started
Bring yourself up to speed with our introductory content
While cloud computing has introduced remarkable efficiencies, cloud security threats continue to pose challenges. Learn where cloud vulnerabilities lie and how to mitigate them. Continue Reading
At the 2017 re:Invent conference, Amazon announced their latest threat detection product: Amazon GuardDuty. Learn how this service works and what sets it apart from other products. Continue Reading
Strong Kubernetes security is important to keep out attackers looking to use compromised containers for malicious activities, like bitcoin mining. Expert Dave Shackleford explains. Continue Reading
Evaluate Cloud Security Management and Cloud Operations Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Secure access to cloud APIs is necessary but challenging. One viable option to combat that is TLS mutual authentication, according to expert Ed Moyle. Continue Reading
Cloud cryptomining as a service is a security risk to users. Expert Frank Siemons discusses cloud mining service providers and what to look out for if you use one. Continue Reading
The Meltdown vulnerability has far-reaching implications, including with cloud providers. Expert Dave Shackleford looks at the Meltdown CPU flaw and what it means for the cloud. Continue Reading
Manage Cloud Security Management and Cloud Operations Security
Learn to apply best practices and optimize your operations.
Monolithic apps built before microservices may contain a wealth of data within them. Transitioning to microservices will need plans for storing, accessing and backing up that data. Continue Reading
Consistent security for all data from cloud providers and third-party partners is what many consider the next evolution of cloud. The biggest cloud security threats for most companies, however, result from in-house staff mistakes, lack of patching ... Continue Reading
Everyone is putting their data in the cloud, from IT staff to department heads. With functionality galore, basic security measures too often go unchecked. Continue Reading
Problem Solve Cloud Security Management and Cloud Operations Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Web security vulnerability scanners often focus on large applications within the enterprise. However, there are plenty of overlooked web systems that contain hidden flaws. Continue Reading
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program. Nick Lewis explains why. Continue Reading
The Katyusha Scanner is based on the open source penetration test scanner Arachni. However, it has been modified to work through Telegram accounts. Nick Lewis explains how it works. Continue Reading