New & Notable
Public Cloud Computing Security News
July 23, 2020
A new report by Check Point Software Technologies revealed attackers were abusing Google Cloud Functions to hide their phishing links within public cloud services.
June 11, 2020
While analyzing the network dropper GuLoader, researchers found an almost identical commercial software tool called CloudEye offered by a legitimate-looking Italian company.
April 01, 2020
AWS has released Amazon Detective, a managed threat hunting service that generates visualizations out of log data from native Amazon Web Services.
January 24, 2020
Google Cloud's new Secret Manager service augments its cloud security capabilities with an eye toward the needs of DevOps teams.
Public Cloud Computing Security Get Started
Bring yourself up to speed with our introductory content
Think you know all there is to know about securing apps in the cloud? Test your grasp of cloud application security best practices with this quiz. Continue Reading
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions. Continue Reading
Cloud computing is a general term for anything that involves delivering hosted services over the internet. Continue Reading
Evaluate Public Cloud Computing Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more. Continue Reading
When choosing a CASB, enterprises face two primary options: a stand-alone service from a third party or a bundled tool set from some of the large cloud providers. It's important to pick your flavor wisely. Continue Reading
Optimal security for serverless architectures requires developers and ops teams to embrace best practices around dependencies, testing, access and more. Continue Reading
Manage Public Cloud Computing Security
Learn to apply best practices and optimize your operations.
The shared responsibility model of cloud security keeps data safe -- except when it doesn't. Prevent your workloads from being the next target of hackers. Continue Reading
An organization that doesn't fully participate -- or even understand -- its role in securing its data in the public cloud takes unnecessary risks. You need to do your part. Continue Reading
As enterprise cloud adoption increases, so too does the risk of cloud sprawl -- and, with it, cloud security threats. Learn how to beat cloud sprawl in two steps. Continue Reading
Problem Solve Public Cloud Computing Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cloud security readiness remains a shortcoming for companies despite the majority using cloud services. Here are three steps they can take to close the cloud security gap. Continue Reading
The shared responsibility model delineates where company and CSP security responsibilities start and end. This is critical not only for compliance, but also the big security picture. Continue Reading
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications. Continue Reading