New & Notable
Hybrid and Private Cloud Computing Security News
October 02, 2018
Kubernetes TLS bootstrap improvements in version 1.12 tackle container management complexity, and users hope there's more where that came from.
September 18, 2018
Without better organizational discipline, digital businesses are at risk for massively disruptive data breaches and attacks. Can DevSecOps transform IT in time to avert disaster?
August 27, 2018
Kubernetes security tools give enterprise IT shops strategic approaches to container security that go beyond shoring up individual container instances.
June 12, 2018
Enterprises need a centralized approach when considering a hybrid cloud security architecture, an analyst says. Plus, is user experience management an IT responsibility?
Hybrid and Private Cloud Computing Security Get Started
Bring yourself up to speed with our introductory content
Domain 4 of the CCSP exam covers the fundamentals of cloud application security. Take this practice quiz to see how well you've absorbed key concepts and vocabulary. Continue Reading
Secure cloud computing demands up-to-date knowledge and a sharp set of IT security skills. Stay current on the essentials in the cloud security arena. Continue Reading
CipherCloud is a vendor that provides a cloud access security broker (CASB) platform, along with a number of security services, aimed at helping organizations secure their cloud-based applications. Continue Reading
Evaluate Hybrid and Private Cloud Computing Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
To fully protect data in a hybrid cloud model, enterprises need to scrutinize integration points, network access controls and the policies they have in place. Continue Reading
Even with the most sophisticated cloud security tools in play, human error -- both from end users and IT teams -- can open up your enterprise to numerous kinds of attacks. Continue Reading
In 2018, IT security teams will continue to fight to keep their cloud deployments safe. Watch out for these common risks associated with APIs, IoT and human error. Continue Reading
Manage Hybrid and Private Cloud Computing Security
Learn to apply best practices and optimize your operations.
The NetSpectre vulnerability performs side-channel attacks to read data across networks. Learn how to use threat modeling to stop speculative execution from expert Ed Moyle. Continue Reading
CISOs have more influence in enterprise cloud adoption, from the procurement of cloud services to controls and policy enforcement in layered environments. Continue Reading
Orchestration tools and APIs can help enterprises implement threat detection and response functionality in the cloud. But it requires crossing another divide: DevOps and security. Continue Reading
Problem Solve Hybrid and Private Cloud Computing Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt from chapter 10 of Handbook of System Safety and Security, editor Edward Griffor discusses cloud and mobile cloud architecture and security. Continue Reading
Threat-related metrics that CISOs find useful often differ from what the C-suite wants to know. Here's how to communicate risk -- and return -- on cloud security investments. Continue Reading
As CIOs adopt hybrid cloud strategies, some quickly learn that force-fitting traditional security methods to public and private clouds, or some combination, doesn't work. Whether it's migrating non-sensitive workloads to off-site data centers or ... Continue Reading