Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

Admission tickets in an digital network / access / admittance / authorization / authentication
Todd McKinnon, CEO and founder, Okta

infographic of cloudscape reflect to modern multicloud technology picture id1262031859 2

How one multicloud-based business manages security controls

AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

podcast 3x16 2
Sponsor Podcast Microsoft

Episode 2: Empowering employees to be secure and productive

Episode 2: When it comes to protecting your business, security is a team sport. Criminal hackers –increasingly sophisticated and persistent – are playing offense, trying to find weak spots to breach an organization. And everyone in...

digital cloud computing cyber security digital data network future picture id1216520824

Top 7 security mistakes when migrating to cloud-based apps

As organizations rush key apps to the cloud to support remote workers, they often create opportunities for attackers. These are the most common mistakes to avoid.

cloud security data breach crime accessible

4 ways attackers exploit hosted services: What admins need to know

Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.

Email takeover  >  Puppeteer hands manipulating strings

How to avoid subdomain takeover in Azure environments

Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.

cso ts multicloud by lordrunar getty images 2400x1600

Building stronger multicloud security: 3 key elements

If complexity is the enemy of security, multicloud presents a formidable foe. Here, experts offer advice on rising to the challenges of securing multicloud environments.

Two figures within a data center / server maze, strewn with clouds.

What CISOs need to know about Europe's GAIA-X cloud initiative

A new cloud platform based on "European values" around data sovereignty, data protection and privacy will be an alternative to the likes of AWS or Azure.

cloud security ts

Developing a multicloud security strategy

Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

common negotiation errors2

5 best practices for negotiating SaaS contracts for risk and security

Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

cybersecurity controls

14 controls for securing SAP systems in the cloud

Organizations often don't follow security best practices when deploying and managing complex SAP systems. This set of security controls from the Cloud Security Alliance aims to change that.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

CSO > Azure automation for Let's Encrypt certificates

Azure Security Benchmark v2: What you need to know

Here's what Microsoft's new security benchmarks include and how they can help you better understand your Azure security posture.

CSO  >  An exclamation-mark alert in a field of abstract technology.

10 common cloud security mistakes that put your data at risk

Yes, the cloud offers many security advantages over on-premises, especially for smaller organizations, but only if you avoid these mistakes around cloud configuration, monitoring and patching.

Encryption  >  Encrypted data / hexadecimal code

Homomorphic encryption: Deriving analytics and insights from encrypted data

Homomorphic encryption allows safe outsourcing of storage of computation on sensitive data to the cloud, but there are trade-offs with performance, protection and utility.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

With cloud's security benefits comes systemic risks, report finds

A new report from the Carnegie Endowment for International Peace seeks to give law and policy makers a better understanding of cloud security risks.

hybridcloud

Hybrid cloud complexity, rush to adopt pose security risks, expert says

Organizations rushing to adopt hosted cloud infrastructure alongside on-premises systems might not fully understand or address potential security threats.

Multiple individual cloud instances / cloud deployments

CIO Think Tank: Setting the multi-cloud agenda

How can enterprises handle the complexity of multiple clouds — and reap unprecedented benefits? In a series of virtual roundtables, 30 IT leaders articulated the challenges and delivered insightful recommendations.

Load More
You Might Also Like