Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB
boxes box idea outside the box it as a product surprise unique masterzphotois getty

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

CSO > cloud computing / backups / data center / server racks / data transfer

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security.

Gears in the form of a cloud in a binary field  >  Cloud controls

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.

black hat / hacker / spotlight / binary overlay

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

Capital One  >  hack

Is the cloud lulling us into security complacency?

In other words, is reliance on cloud services lulling us into security complacency?

venmo data breach lock security breach circuit board by weerapatkiatdumrong getty

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

distributed / decentralized network connections across the globe

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.

Microsoft Cloud App Security

How to set up Microsoft Cloud App Security

Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies.

keeping the cloud secure cloud security lock padlock private cloud

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce sets the bar for cloud security and the industry. Now Amazon needs to reinforce this leadership in an era of dynamic software development and hybrid cloud computing.

CSO  >  Access protocols  >  Pixelated digital check mark and process arrows.

How to use the new Microsoft 365 Business Conditional Access feature

Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should.

Load More