Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

public cloud

Don’t fall off the log!

Effective log management is key to data security in the public cloud.

cloud computing - public, private; open, locked

Cloud computing security chaos continued at RSA Conference 2018

Cloud security has growing needs and lots of challenges. Here are some thoughts on solutions and strategies.

10 backup archiving

Exploring the paradigm shift from backup to data protection

Smart organizations evaluate their overall data footprint and transform their traditional back office IT to a streamlined data protection approach for both cloud and on-premises data.

binary cyberattack cybersecurity hacked protected

What is a cybersecurity technology platform anyway?

Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes.

cloud computing - data center

Review: Protecting clouds with Cloud Defender from Alert Logic

Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic...

cloud security ts

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

cloud security ts

Cloud security will (and should) dominate the RSA Conference

Cloud computing is a runaway IT train, but cloud security is still messy and immature. RSA should become the place to go for cloud security vision, training, best practices, and technology leadership.

Adobe logo and products reflected in displays.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

devops training

Secdevops or devsecops or devops next-generation (NG) – What is your take on devops?

Should devops adapt to include and incorporate new technologies and expand the community of practitioners?

Government building with greek columns

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

cloud computing [by RawPixel - CC0 via Pexels]

McKinsey research shows how to leverage the public cloud, securely

An interview with McKinsey's James Kaplan on the path to a secure public cloud.

security automation robot protects defends from attack intrusion breach

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind.

cloud security

Palo Alto Networks buys Evident.io, extends its cloud security solution

With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

hot and cold fire and ice clash temperature

8 hot cyber security trends (and 4 going cold)

What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training.

monitoring systems

The security operations platform: automation, orchestration and more

As the security automation and orchestration market matures, features like collaboration, event & case management, plus reporting and metrics are growing in importance. Learn how burgeoning security operations platforms are finding a...

cloud security lock

Understanding the challenges of cloud security

Stay grounded as cloud security becomes more complicated.

cloud security ts

The cloud’s the limit for secure, compliant identity storage and personal data

As we go forward into secure, compliant, digital identity-driven ecosystems, we need to understand how to get their security right.

Load More