Videos
-
Consider international cloud security standards, legal reqs
Whether you're accessing (or operating) the cloud from Miami, Milan or Mumbai, you need to ensure those services meet regional cloud security standards and legal requirements.
-
Curb cloud computing security risks with ITIL frameworks
As your use of cloud services grows, so does your need for effective IT service management so that permissions, controls and compliance requirements are consistently addressed.
-
Secure development lifecycle in the cloud: Trust but verify
Cloud providers may advertise their apps as secure, but it’s up to enterprises to validate those claims and confirm adherence to a secure development lifecycle.
-
Multiple layers of cloud security controls mitigate risk
Just as there's no one way to infiltrate the cloud, there's no singular way to protect it. Cloud computing security controls incorporate facilities, personnel, processes and more.
-
These data security technologies are crucial in the cloud
While the cloud presents new challenges, many data security technologies used in it are wholly familiar. Learn more about which tool best suits each phase of the data lifecycle.
-
Time to get real about cloud computing security architecture
You wouldn't use a service where security was an afterthought. Think like a customer -- a strong cloud security architecture should be built into your services from the start.
-
Identity and access management in the cloud: Risk or reward?
In this video, expert Adam Gordon explains the implications of using identity and access management in the cloud as well as opportunities the model offers.
-
Solving cloud console fatigue for enterprises
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications.
-
Skyhigh Networks: Demand for IaaS platform security growing
Skyhigh Networks' Kamal Shah talks with SearchSecurity about how the CASB market has changed and how his company is tackling IaaS platforms and custom applications.
-
Using the shared responsibility model to secure your cloud environment
The shared responsibility model for cloud services puts different sets of security duties on vendors and customers. Learn what to expect when moving services to the cloud.
-
Who does what in cloud data compliance?
Higher learning: The University of Notre Dame's IT director looks at the shared responsibility model for compliance in the cloud.
-
CIOs no longer up in the air on hybrid cloud security concerns
David Strom outlines six information security strategies that CIOs have adopted as their organizations migrate toward hybrid clouds.
-
Qualys CEO discusses cloud computing threats, 'cloud without borders'
Qualys CEO Philippe Courtot spoke at RSA Conference 2015 about why security firms need to take a page from Doctors Without Borders.
-
Shadow cloud problem growing, SkyHigh Networks says
Kamal Shah of SkyHigh Networks talks with SearchSecurity about the rapid adoption of shadow cloud apps and services in the enterprise.
-
Pros and cons: Cloud-based identity and access management
While cloud-based identity and access management services offer numerous benefits to enterprises, there are also a number of drawbacks. Learn the risks and rewards of cloud IAM.
-
Trustwave sees emergence of on-demand pen testing services
Trustwave's Charles Henderson spoke with Editorial Director Robert Richardson about the company's on-demand penetration testing services.
-
Q&A: Jim Reavis recaps news from Cloud Security Alliance Congress 2013
Video: CSA CEO Jim Reavis recaps the 2013 Cloud Security Alliance Congress, including its SAFECode partnership and Software Defined Perimeter effort.
-
Cloud security basics: What enterprises, IT pros need to know
Video: Securosis CEO Rich Mogull details cloud security basics, including how the cloud affects enterprises today and the joys of security automation.
-
CSA exec: Cloud defense demands intelligent security strategy
Video: Cloud Security Alliance COO John Howie discusses the 'intelligent security' strategy necessary for cloud providers to defeat targeted attacks.
-
FedRAMP basics: Taking the mystery out of cloud security assessment
Video: Tony UcedaVelez of VerSprite discusses FedRAMP and how it's making cloud security assessments easier for government and non-government firms.
-
On cloud transparency, providers offering 'too much information'
Video: Cloud Security Alliance COO John Howie discusses improvements in providers' efforts at cloud transparency, including when data crosses borders.
-
Security, cloud monitoring tools viewed as cloud adoption barriers
Video: Eric Chiu, president of HyTrust, explains why subpar cloud monitoring tools are a top barrier to cloud adoption in the enterprise.
-
John Howie discusses CSA initiatives, cloud adoption issues at RSA
Video: John Howie, COO of the Cloud Security Alliance, discusses the ongoing initiatives at the CSA and how to overcome cloud adoption issues.
-
Eric Chiu analyzes version 2 of the PCI DSS cloud computing guidelines
Video: Eric Chiu, president of HyTrust, examines v. 2 of the PCI DSS cloud computing guidelines and offers guidance on cloud customer responsibility.
-
Assessing IaaS, PaaS and SaaS security issues and risks
Video: Leading cloud security expert Rich Mogull introduces IAAS, PAAS, and SAAS, and the security risks you can expect with each.
-
Evaluating cloud providers: Avoid security issues with cloud computing
Are security issues with cloud computing blocking an implementation? Expert Davi Ottenheimer offers tips for evaluating cloud providers for security.
-
Presentation: Evaluating Security as a Service providers
Expert Joe Granneman on what to look for when evaluating Security as a Service providers, including separation of duties, and multi-tenancy security.
-
Google Apps security director on data security within the cloud
Google Apps security director Eran Feigenbaum discusses data security in the cloud in this exclusive RSA Conference 2011 interview.