New & Notable
Cloud Security Management and Cloud Operations Security News
August 09, 2018
At Black Hat 2018, a Netflix security engineer introduced a new open source tool designed to more effectively monitor AWS credentials in large cloud environments, like Netflix's.
June 26, 2018
Ping Identity increased its focus on API security with the acquisition of Elastic Beam, a startup that uses artificial intelligence to apply behavioral security on enterprise APIs.
June 12, 2018
Enterprises need a centralized approach when considering a hybrid cloud security architecture, an analyst says. Plus, is user experience management an IT responsibility?
April 23, 2018
At RSA Conference 2018, CyberArk researchers described how threat actors are able to gain access to cloud environments and elevate privileges through 'shadow admins.'
Cloud Security Management and Cloud Operations Security Get Started
Bring yourself up to speed with our introductory content
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. Continue Reading
With so many cloud application security threats out there, it can start to feel like the odds stacked are against you. Find out how to level the playing field. Continue Reading
Evaluate Cloud Security Management and Cloud Operations Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud providers may advertise their apps as secure, but it’s up to enterprises to validate those claims and confirm adherence to a secure development lifecycle. Continue Reading
Security issues are still a top concern when moving to the cloud. SAP CSO Justin Somaini highlights the questions to ask cloud providers to make sure company data is protected. Continue Reading
The cloud might be the best of the available anonymity tools. Expert Frank Siemons explains the other options for anonymity for security and why the cloud is the best for privacy. Continue Reading
Manage Cloud Security Management and Cloud Operations Security
Learn to apply best practices and optimize your operations.
Not all data requires the same level of encryption. Use data classification to gauge your security needs, including for workloads that span on-premises and cloud environments. Continue Reading
Threat intelligence can facilitate cloud-based malware collection, which has value for enterprise cybersecurity. Expert Frank Siemons discusses collecting and analyzing malware. Continue Reading
Time-sharing systems got a lot right from a security standpoint. "We aimed toward a completely lights-out, 'no chance for mistakes' interface," says the security researcher. Continue Reading
Problem Solve Cloud Security Management and Cloud Operations Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Web security vulnerability scanners often focus on large applications within the enterprise. However, there are plenty of overlooked web systems that contain hidden flaws. Continue Reading
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program. Nick Lewis explains why. Continue Reading
The Katyusha Scanner is based on the open source penetration test scanner Arachni. However, it has been modified to work through Telegram accounts. Nick Lewis explains how it works. Continue Reading