New & Notable
Evaluating Cloud Computing Providers News
March 04, 2016
Several CISOs discussed why cloud access security brokers are imperative to their respective enterprises during a panel discussion at RSA Conference 2016.
March 02, 2016
Cloud access security brokers are dominating the cloud security conversation at this year's RSA Conference. Here's what vendors are saying about CASBs.
February 01, 2016
What companies and cloud security products do organizations consider when they see to reduce their cloud vulnerabilities?
January 28, 2016
An advocacy group representing cloud providers such as Hewlett Packard Enterprise and IBM has criticized FedRAMP and called on the government to fix the cloud certification program.
Evaluating Cloud Computing Providers Get Started
Bring yourself up to speed with our introductory content
Cloud computing is a general term for anything that involves delivering hosted services over the internet. Continue Reading
A cloud audit is a periodic examination an organization does to assess and document its cloud vendor's performance. Continue Reading
Aligning the NIST Cybersecurity Framework with cloud services such as AWS, Azure and Google Cloud can improve cloud security. Read how to best use the framework for the cloud. Continue Reading
Evaluate Evaluating Cloud Computing Providers Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Many organizations create management responses to traditional audit findings. But did you know organizations can do them after IT audits and assessments, too? Continue Reading
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these seven vendors stack up and protect access to cloud applications. Continue Reading
CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. Continue Reading
Manage Evaluating Cloud Computing Providers
Learn to apply best practices and optimize your operations.
Booz Allen's Jimmy Pham and Brad Beaulieu dispel four major cloud security myths, exploring why staying in the cloud rather than returning to on premises may be the more secure option. Continue Reading
Enterprise security best practices must account for changes in cloud landscapes. Learn how to overcome such challenges and bolster multi-cloud security with technology and policy. Continue Reading
Data sovereignty regulations combined with a tsunami of data growth and increased cloud usage have created a perfect storm for enterprises. Follow these steps to ensure compliance. Continue Reading
Problem Solve Evaluating Cloud Computing Providers Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With SBOMs, companies will know what components constitute the software they purchase, making it easier for security teams to understand and manage vulnerabilities and risks. Continue Reading
The shared responsibility model delineates where company and CSP security responsibilities start and end. This is critical not only for compliance, but also the big security picture. Continue Reading
With numerous security standards and certifications available, evaluating a cloud provider can be tricky. Expert Dan Sullivan explains what to look for during evaluation. Continue Reading