Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

cloud security / data protection / encryption / security transition
Multiple individual cloud instances / cloud deployments

multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

cloud network assets / cryptocurrency / IoT / disruptive technologies / digital transformation

Review: How Fugue protects cloud assets

The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud.

keeping the cloud secure cloud security lock padlock private cloud

Review: How DivvyCloud protects cloud deployments

Keep your cloud instances in compliance throughout their lifecycle — regardless of the type of cloud, the technology or the vendor.

data / analytics / trends

5 security operations and analytics trends to watch in 2020

Look for more integration, an increasing focus on risk management, and greater use of the public cloud.

cloud security lock

3 cloud security ‘hacks’ to consider today

Keeping your cloud deployments secure is a full-time job. Here are a few shortcuts that make your cloud security better and your life easier

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

boxes box idea outside the box it as a product surprise unique masterzphotois getty

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

CSO > cloud computing / backups / data center / server racks / data transfer

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security.

Gears in the form of a cloud in a binary field  >  Cloud controls

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

reno maglitto channel and alliance director apac netskope.2

Channels are true evangelists of cloud security: Reno Maglitto

Reno Maglitto, Channel and Alliance Director APAC, Netskope on CASB market, the channel ecosystem and Netskope’s USP for securing organizations’ cloud presence.

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

surendra singh 1200x800

Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint

The time has come for shifting the paradigm from protecting infrastructure to understanding the behavior of users, says Surendra Singh, Senior Director and Country Manager at Forcepoint.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Load More
You Might Also Like