Tips
Tips
-
How to make a cloud risk assessment easier with frameworks, standards
A cloud risk assessment can often fall by the wayside in an enterprise, but using a standard or framework can simplify it. Expert Dave Shackleford discusses the options available. Continue Reading
-
Building an intrusion detection and prevention system for the cloud
An intrusion detection and prevention system for cloud services is an important part of an enterprise's security stature. Expert Frank Siemons discusses IDS/IPS in the cloud. Continue Reading
-
How to strategically implement CASBs in the enterprise
CASBs can offer help for enterprises that leverage cloud services. Expert Ajay Kumar examines the use cases, functions and architectures of cloud access security brokers. Continue Reading
-
Why CloudFanta malware poses an unusual threat to enterprises
CloudFanta is a new kind of malware threatening enterprises. Expert Rob Shapland explains how it leverages cloud storage site SugarSync to infect users and enterprises. Continue Reading
-
How to effectively manage the cloud logs of security events
Cloud logs of security events produce an abundance of data. Expert Dave Shackleford discusses how to filter through it and get to the important security events. Continue Reading
-
How cloud endpoint protection products benefit enterprises
Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of these products and how they benefit enterprises. Continue Reading
-
How Microsoft's Secure Data Exchange bolsters cloud data security
Microsoft's new service, Secure Data Exchange, can help protect cloud data while in transit and at rest. Expert Rob Shapland looks at the service and how it works for enterprises. Continue Reading
-
VM isolation technique considerations for enterprises
VM isolation techniques are good strategies to prevent infections from spreading to the entire cloud environment. Ed Moyle explains what enterprises need to know about isolation. Continue Reading
-
How to handle privileged user management in the cloud
Privileged user management is important for enterprises operating on the cloud. Expert Dave Shackleford discusses some best practices to help secure cloud access control. Continue Reading
-
How to prepare for a cloud DDoS attack on an enterprise
Suffering a cloud DDoS attack is now more likely than ever. Expert Frank Siemons discusses what enterprises need to know about these attacks and how to prevent them. Continue Reading
-
Cloud incident response: What enterprises need to include in a plan
A cloud incident response plan can be difficult to assemble. Expert Rob Shapland discusses the basics of what to include in a response plan when the incident involves the cloud. Continue Reading
-
A look at the shared responsibility model of cloud providers
Many cloud providers now offer a shared responsibility model for their customers. Expert Dave Shackleford looks at the major providers' models and what they might be missing. Continue Reading
-
How bring your own encryption in the cloud works for enterprises
Bring your own encryption offerings for the cloud are more common now. Expert Ed Moyle discusses the benefits and drawback of BYOE and what to know before implementation. Continue Reading
-
Cloud DDoS protection: What enterprises need to know
DDoS attacks are a continuing problem, and enterprises should consider using cloud DDoS protection services. Expert Frank Siemons discusses the cloud options. Continue Reading
-
What to know about SIEM as a service before deployment
There's been increased interest in SIEM as a service and enterprises need to get to know the model before using it. Expert Frank Siemons explains what's different about it. Continue Reading