Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

4 encryption keys
cisco logo sign

cloud security

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

medical x ray imaging hands

X-ray your SaaS apps to reveal hidden security vulnerabilities

Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications.

network security locks and cables

Moving to central network security policy management for hybrid clouds

With controls built into the infrastructure, the industry is headed toward central network security policy management (and reporting).

cloud apps

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

symantec banner

Symantec in a position to progress and prosper

Symantec has some internal challenges and increased competition, but it appears to be facing these challenges from a position of strength in the market.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

binary cyberattack cybersecurity hacked protected

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

cloud security lock

5 ways small to midsize businesses can stay safe in the cloud

By taking the right security precautions, small to midsize businesses (SMBs) can benefit greatly from cloud computing.

containers port ship boat

Containers are here. What about container security?

ESG data indicates that cybersecurity pros have problems around the nuances of container technology and implementing container-centric security controls.

cubes - blocks - squares - containers

Fact vs. fiction: 6 myths about container security

Quell these myths to find default security and secure coding at the heart of well-architected containers.

data storage man watch

It’s time to think harder about security data management

Organizations are running into scalability problems as they collect, process, and analyze more security data. It’s time for enterprise security data management.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

public cloud

Don’t fall off the log!

Effective log management is key to data security in the public cloud.

cloud computing - public, private; open, locked

Cloud computing security chaos continued at RSA Conference 2018

Cloud security has growing needs and lots of challenges. Here are some thoughts on solutions and strategies.

10 backup archiving

Exploring the paradigm shift from backup to data protection

Smart organizations evaluate their overall data footprint and transform their traditional back office IT to a streamlined data protection approach for both cloud and on-premises data.

binary cyberattack cybersecurity hacked protected

What is a cybersecurity technology platform anyway?

Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes.

Load More