Cloud security
The cloud offers improved efficiency, flexibility and scalability, but its benefits can be reversed if security isn't top of mind. Read cloud security best practices, including tips on data protection and IaaS, PaaS and SaaS security, as well as cloud-specific tools and services such as CASBs, CWPPs and CSPM.
Top Stories
- 
				Tip
					26 Nov 2024
					
									
										
Microsoft Teams monitoring tips for admins
Learn how to use PowerShell to set up an automated way to check for suspicious activity in the Microsoft chat service to avoid security and compliance issues. Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
				News
					26 Nov 2024
					
									
										
AWS CISO details automated cybersecurity tools for customers
Chris Betz, CISO at AWS, discusses how three internal tools are designed to automatically identify and mitigate threats for the cloud giant's customers. Continue Reading
By- Rob Wright, Senior News Director
 
 
- 
                Definition
                18 Nov 2024
                
What is public cloud? A definition and in-depth guide
A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources, applications and services available on demand to remote users around the world. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 - Kathleen Casey, Site Editor
 - Ron Karjian, Industry Editor
 
 - 
                News
                15 Nov 2024
                
MFA required for AWS Organizations member accounts in 2025
AWS is one of several cloud providers that will implement MFA requirements over the next year, with other relevant names including Google Cloud and Microsoft Azure. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Answer
                14 Nov 2024
                
8 ways enterprises can enhance object storage security
Object storage is a popular method for storing data, so security is critical. Access is a big piece, extending across several of the eight security best practices here. Continue Reading
By - 
                Podcast
                14 Nov 2024
                
CEO: GenAI changes multi-cloud security, network equation
Aviatrix CEO Doug Merritt sees generative AI apps forcing a more distributed approach to cloud infrastructure, but he believes it will also help SecOps catch up with threats. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Feature
                08 Nov 2024
                
Top data protection software platforms of 2025 for business
Data privacy laws, sophisticated cyberattacks and generative AI's infiltration make it imperative to invest in multifunctional data protection software, but what tools are tops? Continue Reading
By - 
                Conference Coverage
                08 Nov 2024
                
Microsoft Ignite 2024 conference coverage
Bookmark this guide and check back regularly to see all the news and analysis related to the latest innovations launching at this year's Microsoft Ignite show. Continue Reading
By- Tom Walat, Site Editor
 
 - 
                Tip
                07 Nov 2024
                
How to create an enterprise cloud security budget
As companies migrate more sensitive data and resources into the cloud, it's important to deploy relevant security tools and processes, while staying within budget. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Feature
                07 Nov 2024
                
15 IAM interview questions to prep for your next career move
The job market for identity and access management positions is strong right now, but the competition could be tough. Use these 15 questions to guide your interview prep. Continue Reading
 - 
                News
                05 Nov 2024
                
Canadian authorities arrest alleged Snowflake hacker
Alexander Moucka was arrested last week and is expected to appear in court Tuesday for allegedly breaching dozens of Snowflake customers. Continue Reading
By- Arielle Waldman, News Writer
 
 - 
                Feature
                01 Nov 2024
                
The future of cloud computing: Top trends and predictions
Expect GenAI, IoT, cloud-native, edge computing, power-hungry data centers, data-hungry LLMs, FinOps and privacy laws to shape public cloud's future as a viable service model. Continue Reading
 - 
                Feature
                29 Oct 2024
                
10 key characteristics of cloud computing
Evaluate how these 10 characteristics of cloud computing, such as on-demand self-service and broad network access, can help you become a more nimble and cost-effective business. Continue Reading
By- Kathleen Casey, Site Editor
 
 - 
                Opinion
                28 Oct 2024
                
Omnissa-CrowdStrike union reunites management and security
Organizations have growing security and management needs, so partnerships between vendors such as the Omnissa-CrowdStrike partnership provide necessary synergy for IT staff. Continue Reading
By- Gabe Knuth, Senior Analyst
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                Feature
                24 Oct 2024
                
AI in cloud computing: Benefits and concerns
Businesses see public cloud as the primary vehicle for delivering generative AI's benefits in productivity, operational efficiency and workflow automation, but challenges remain. Continue Reading
 - 
                News
                24 Oct 2024
                
AWS CDK security issue could lead to account takeovers
Aqua Security researchers discovered AWS Cloud Development Kit is susceptible to an attack vector the vendor refers to as 'shadows resources,' which can put accounts at risk. Continue Reading
By- Rob Wright, Senior News Director
 
 - 
                News
                21 Oct 2024
                
Study outlines 'severe' security issues in cloud providers
Possible security issues involving cloud systems should be taken seriously, as the paper noted the five vendors outlined are responsible for more than 22 million users. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                News
                17 Oct 2024
                
HashiCorp Vault scalability updates target big enterprises
HashiCorp Vault 1.18 updates make it more suited to large companies, which the vendor is courting with a lighter cloud migration push than with Terraform. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                17 Oct 2024
                
HashiCorp CTO talks AI strategy, Ansible tie-ins, FedRAMP
In a Q&A to wrap up HashiConf, the company's co-founder and CTO gave his outlook on HashiCorp's approach to AI, configuration management and cloud compliance. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Tip
                11 Oct 2024
                
Cloud licensing explained: What businesses need to know
Businesses vacating the premises and setting up their data and applications in a distributed environment must consider cloud licensing's options, advantages and disadvantages. Continue Reading
 - 
                News
                09 Oct 2024
                
Ivanti zero-day vulnerabilities exploited in chained attack
The new exploit chains targeting Ivanti Cloud Service Application customers are connected to a previously disclosed critical path traversal flaw, CVE-2024-8963. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Tip
                08 Oct 2024
                
How to plan a cloud strategy: Complete guide and template
A cloud strategy document is a mission statement, not a design document. It should capture the what and why of a company's cloud strategy, without delving into the minutiae of how. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Opinion
                01 Oct 2024
                
Research reveals strategies to improve cloud-native security
As organizations focus on the cloud to deliver and scale applications, security teams struggle to keep up. Recent research points to how teams can effectively manage cloud security risk. Continue Reading
By- Melinda Marks, Practice Director
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                Definition
                27 Sep 2024
                
What is a cloud access security broker (CASB)?
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
 - Dan Sullivan
 
 - 
                Tip
                23 Sep 2024
                
ASPM vs. ASOC: How do they differ?
Application security posture management and application security orchestration and correlation tools both aim to secure applications but use different methodologies. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Definition
                04 Sep 2024
                
What is a cloud architect and how do you become one?
A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. Continue Reading
By- Kinza Yasar, Technical Writer
 - Ben Lutkevich, Site Editor
 - Nicholas Rando, TechTarget
 
 - 
                Tip
                04 Sep 2024
                
Microsoft Purview Audit helps IT flush out bad behavior
The auditing tool gives enterprises a way to find problems by examining logs from Microsoft 365 cloud services, such as Exchange Online, to see what actions were taken and where. Continue Reading
By - 
                Definition
                20 Aug 2024
                
What is cloud detection and response (CDR)?
Cloud computing requires a security approach that is different than traditional protections. Where does cloud detection and response fit into a cybersecurity strategy? Continue Reading
 - 
                Tip
                19 Aug 2024
                
Too many cloud security tools? Time for consolidation
Does your organization need every cloud security platform and service currently in use? Tool consolidation can reduce the chances of coverage gaps and increase security. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                News
                19 Aug 2024
                
Microsoft to roll out mandatory MFA for Azure
Following several high-profile attacks across the globe on MFA-less accounts, Microsoft will make the security measure mandatory for Azure sign-ins beginning in October. Continue Reading
By- Arielle Waldman, News Writer
 
 - 
                News
                08 Aug 2024
                
Wiz researchers hacked into leading AI infrastructure providers
During Black Hat USA 2024, Wiz researchers discussed how they were able to infiltrate leading AI service providers and access confidential data and models across the platforms. Continue Reading
By- Arielle Waldman, News Writer
 
 - 
                News
                07 Aug 2024
                
Researchers unveil AWS vulnerabilities, 'shadow resource' vector
During a Black Hat USA 2024 session, Aqua Security researchers demonstrated how they discovered six cloud vulnerabilities in AWS services and a new attack vector. Continue Reading
By- Rob Wright, Senior News Director
 
 - 
                Opinion
                06 Aug 2024
                
Highlights from CloudNativeSecurityCon 2024
This year's Cloud Native Computing Foundation CloudNativeSecurityCon highlighted cloud-native security issues to its many attendees who don't hold security-focused roles. Continue Reading
By- Melinda Marks, Practice Director
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                Tip
                06 Aug 2024
                
How to protect against cloud DDoS attacks
Cloud DDoS protection enables companies to detect and mitigate DDoS attacks before they cause significant downtime, infrastructure issues and potential business losses. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                News
                31 Jul 2024
                
Microsoft confirms DDoS attack disrupted cloud services
Microsoft suffered a DDoS attack on Tuesday that caused massive outages for customers around the world. Continue Reading
By- Arielle Waldman, News Writer
 
 - 
                Feature
                29 Jul 2024
                
8 blockchain-as-a-service providers to have on your radar
You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. Continue Reading
By- Christine Campbell, The Alpha Content Company
 - Tony Kontzer
 
 - 
                Definition
                26 Jul 2024
                
What is malware? Prevention, detection and how attacks work
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server. Continue Reading
By- Kinza Yasar, Technical Writer
 - Ben Lutkevich, Site Editor
 
 - 
                Tip
                22 Jul 2024
                
8 cloud detection and response use cases
Unsure whether cloud detection and response is useful for your organization? These eight use cases could make CDR indispensable. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Tip
                22 Jul 2024
                
Cloud detection and response: CDR vs. EDR vs. NDR vs. XDR
Cloud detection and response is the latest detection and response tool. Explore how it differs from endpoint, network and extended detection and response tools. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                News
                18 Jul 2024
                
Amazon CISO discusses the company's cautious approach to AI
At the recent AWS re:Inforce 2024 conference, Amazon CISO CJ Moses spoke about the risks and threats associated with new AI technology and how the cloud giant addresses them. Continue Reading
By- Rob Wright, Senior News Director
 
 - 
                Tip
                18 Jul 2024
                
How to conduct a cloud security assessment
Cloud computing presents organizations of all types with a nearly endless array of security challenges. Is your security team keeping up – and how do you know? Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Answer
                11 Jul 2024
                
CASB vs. SASE: What's the difference?
CASB and SASE enhance network and SaaS application security. CASB acts as a security layer for cloud services, while SASE integrates networking and security into one framework. Continue Reading
By- Evgeniy Kharam, EK Cyber and Media Consulting
 - Dmitry Raidman, Cybeats & Security Architecture Podcast
 
 - 
                Definition
                05 Jul 2024
                
What is a cyber attack? How they work and how to stop them
A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
 - Mary K. Pratt
 
 - 
                Feature
                03 Jul 2024
                
RSA security conference video roundup: 2024 perspectives
We chatted on camera with attendees and presenters at RSAC 2024. To get the highlights of one of the world's major cybersecurity conferences, check out this video collection. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
 
 - 
                Tip
                02 Jul 2024
                
How to secure Azure Functions with Entra ID
Centralized identity management is vital to the protection of your organization's resources. Do you know how to secure Azure Functions with Entra ID to optimize data security? Continue Reading
By- Liam Cleary, SharePlicity
 
 - 
                Opinion
                21 Jun 2024
                
AWS makes strong case for its security advantages at re:Inforce
At re:Inforce 2024, AWS shared details of its secure-by-design measures to protect customer data. Continue Reading
By- David Vance
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                Feature
                17 Jun 2024
                
CASB vs. CSPM vs. CWPP: Comparing cloud security tool types
Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
 
 - 
                Definition
                13 Jun 2024
                
cloud security
Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats. Continue Reading
By- Kinza Yasar, Technical Writer
 - Andrew Froehlich, West Gate Networks
 - Sharon Shea, Executive Editor
 
 - 
                News
                12 Jun 2024
                
AWS touts security culture, AI protections at re:Inforce 2024
AWS executives highlighted the company's longstanding security, which evoked comparisons to its chief cloud rival Microsoft and the recent Cyber Safety Review Board report. Continue Reading
By- Rob Wright, Senior News Director
 
 - 
                Tip
                12 Jun 2024
                
The 10 best cloud security certifications for IT pros in 2024
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal. Continue Reading
By- Sharon Shea, Executive Editor
 
 - 
                Tip
                11 Jun 2024
                
SASE vs. SSE: Explaining the differences
Most security professionals are familiar with secure access service edge, but now, there's a new tool for administrators to consider: security service edge. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                News
                10 Jun 2024
                
Mandiant: 'Exposed credentials' led to Snowflake attacks
According to new threat research, Mandiant is reporting that UNC5537 conducted attacks against Snowflake database customers at least as early as April 14. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Tip
                10 Jun 2024
                
8 SaaS security best practices for 2024
SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. Continue Reading
By- Ed Moyle, Drake Software
 
 - 
                Podcast
                05 Jun 2024
                
Risk & Repeat: Sorting out Snowflake's security mess
This podcast episode discusses the recent attacks against Snowflake customers and a controversial report that claimed the cloud storage and analytics giant had been breached. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Tip
                05 Jun 2024
                
What is a cloud security framework? A complete guide
With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. Continue Reading
By- Ed Moyle, Drake Software
 
 - 
                Tip
                05 Jun 2024
                
Cloud security automation: Benefits and best practices
Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                News
                04 Jun 2024
                
Tenable warns of vulnerability in Azure service tags
Microsoft disagreed with Tenable's assessment, saying the security issue in Azure service tags is not a vulnerability and that additional authentication layers are required. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Feature
                04 Jun 2024
                
What is cloud security management? A strategic guide
This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. Continue Reading
By- Phil Sweeney, Industry Editor
 - Stephen J. Bigelow, Senior Technology Editor
 
 - 
                News
                03 Jun 2024
                
Snowflake: No evidence of platform breach
Snowflake on Saturday issued a joint statement with third-party investigators Mandiant and CrowdStrike denying reports that its platform had been breached. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                News
                31 May 2024
                
Threat actor compromising Snowflake database customers
A threat actor tracked as UNC5537 is using stolen credentials against Snowflake database customers to conduct data theft and extortion attacks, cloud security firm Mitiga said. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Definition
                21 May 2024
                
cloud penetration testing
Cloud penetration testing is a tactic an organization uses to assess its cloud security effectiveness by attempting to evade its own defenses. Continue Reading
By- Char Sample, ICF International
 
 - 
                News
                21 May 2024
                
Critical bug discovered in open source utility Fluent Bit
Tenable researchers discovered a critical vulnerability, dubbed 'Linguistic Lumberjack,' in Fluent Bit, an open source logging utility widely used by major cloud providers. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Definition
                21 May 2024
                
cloud workload protection platform (CWPP)
A cloud workload protection platform (CWPP) is a security tool designed to protect workloads that run on premises, in the cloud or in a hybrid arrangement. Continue Reading
By- Phil Sweeney, Industry Editor
 
 - 
                Definition
                17 May 2024
                
hashing
Hashing is the process of transforming any given key or a string of characters into another value. Continue Reading
By- Kinza Yasar, Technical Writer
 - Andrew Zola
 
 - 
                News
                16 May 2024
                
IBM sells QRadar SaaS assets to Palo Alto Networks
The deal with Palo Alto Networks comes one year after IBM announced QRadar Suite, an AI-enhanced security platform that combined existing SIEM and XDR products. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Definition
                15 May 2024
                
Common Vulnerability Scoring System (CVSS)
The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity and characteristics of security vulnerabilities in information systems. Continue Reading
By- Kinza Yasar, Technical Writer
 - Alexander S. Gillis, Technical Writer and Editor
 - Madelyn Bacon, TechTarget
 
 - 
                News
                15 May 2024
                
AI-driven attacks seen as chief cloud security threat
Tried and true cloud security threats are on the rise. But according to a new report from Palo Alto Networks, the specter of generative AI threats has organizations concerned. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Definition
                14 May 2024
                
cloud-native application protection platform (CNAPP)
Cloud-native application protection platform, or CNAPP, is a software product that bundles multiple cloud security tools into one package, thereby delivering a holistic approach for securing an organization's cloud infrastructure, its cloud-native applications and its cloud workloads. Continue Reading
 - 
                Tip
                14 May 2024
                
Cloud vulnerability management: A complete guide
Your security strategy might not grapple directly with cloud vulnerability management. Is it time to consider the possible benefits and challenges of this emerging product class? Continue Reading
By- Ed Scannell, Freelancer
 
 - 
                News
                14 May 2024
                
SonicWall CEO talks transformation, security transparency
SonicWall's CEO said that following a string of serious vulnerabilities the company responded to in 2021, product development and quality assurance operations were overhauled. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Tip
                13 May 2024
                
How to create a cloud security policy, step by step
What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. Continue Reading
By - 
                Tip
                08 May 2024
                
VM security in cloud computing explained
Cloud computing allows an organization to reduce its risks by having to secure fewer resources. The tradeoff is that cloud creates more attack vectors. Don't let VMs trip you up. Continue Reading
By- Char Sample, ICF International
 
 - 
                Tip
                07 May 2024
                
What is a cloud security engineer, and how do I become one?
A cloud security engineer has specific responsibilities for helping to secure cloud infrastructure, applications and IT assets. Continue Reading
 - 
                Tip
                06 May 2024
                
SSPM vs. CSPM: What's the difference?
Posture management in the cloud is key, but evaluating different tools, such as SaaS security posture management and cloud security posture management platforms, can be confusing. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Definition
                06 May 2024
                
cloud infrastructure entitlement management (CIEM)
Cloud infrastructure entitlement management (CIEM) is a discipline for managing identities and privileges in cloud environments. Continue Reading
 - 
                Opinion
                03 May 2024
                
AWS to protect its cloud using CrowdStrike security products
AWS is replacing a variety of security products with the CrowdStrike Falcon Platform to further secure applications and data on its cloud. Continue Reading
By- Dave Gruber, Principal Analyst
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                News
                02 May 2024
                
Dropbox discloses data breach involving Dropbox Sign
A threat actor accessed Dropbox Sign customer names, emails, hashed passwords, API keys, OAuth tokens, multifactor authentication information and other data. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Definition
                30 Apr 2024
                
cloud security posture management (CSPM)
Cloud security posture management (CSPM) is a market segment for IT security tools that are designed to identify misconfiguration issues and compliance risks in the cloud. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
 
 - 
                Definition
                30 Apr 2024
                
Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. Continue Reading
 - 
                Opinion
                30 Apr 2024
                
Security updates from Google Cloud Next '24 center on GenAI
Google has infused Gemini into its security tools and while GenAI isn’t going to solve every security problem right away, its assistive capabilities save much needed time. Continue Reading
By- Melinda Marks, Practice Director
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                Tip
                29 Apr 2024
                
Navigating cloud patch management: Benefits, best practices
Bad actors use malicious code to exploit vulnerabilities, targeting on-demand systems and applications. Having an efficient mechanism to deploy patches in the cloud is critical. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
 
 - 
                Tip
                29 Apr 2024
                
Top 11 cloud security challenges and how to combat them
Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. Continue Reading
By- Sharon Shea, Executive Editor
 
 - 
                Tip
                25 Apr 2024
                
3 ways AI is transforming cloud security, according to experts
Generative AI only recently burst into the collective consciousness, but experts say it is already changing cloud security -- on both the defensive and offensive sides. Continue Reading
By- Alissa Irei, Senior Site Editor
 
 - 
                Feature
                22 Apr 2024
                
Explore CASB use cases before you decide to buy
CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. Continue Reading
By- Kevin Tolly, The Tolly Group
 
 - 
                News
                18 Apr 2024
                
CrowdStrike extends cloud security to Mission Cloud customers
CrowdStrike Falcon Cloud Security and Falcon Complete Cloud Detection and Response (CDR) will be made available through the Mission Cloud One AWS MSP platform. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Tip
                17 Apr 2024
                
8 data protection challenges and how to prevent them
Businesses contend with a combination of issues spawned by data overload, privacy regulations, access rights, cyberattacks, cloud environments, generative AI and human error. Continue Reading
 - 
                Tip
                15 Apr 2024
                
4 types of cloud security tools organizations need in 2024
From CIEM to SSE, these four types of cloud security tools help boost security efforts as organizations continue to expand their cloud environments. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Tip
                15 Apr 2024
                
Data protection vs. security vs. privacy: Key differences
Data protection, privacy and security might look alike but their differences can make or break a comprehensive compliance program to collect, manage, access, erase and secure data. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                Tip
                10 Apr 2024
                
Cloud database security: Best practices, challenges and threats
If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Tip
                05 Apr 2024
                
9 top cloud storage security issues and how to contain them
A handful of major cloud storage security issues, such as insufficient access controls and lack of compliance, remain. Learn how to successfully address them. Continue Reading
By - 
                Feature
                04 Apr 2024
                
Thought leaders tips to obtain a secure cloud environment
Securing the cloud ecosystem is a multifaceted endeavor requiring both strategy and cooperation. Learn best practices and practical advice from leading speakers in this space. Continue Reading
By- Alicia Landsberg, Senior managing Editor
 
 - 
                Tip
                02 Apr 2024
                
Cloud computing forensics techniques for evidence acquisition
With the proper tools and methodologies, security teams can provide analysts with the critical pieces required to complete cloud computing forensics investigations. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Tip
                27 Mar 2024
                
Private vs. public cloud security: Benefits and drawbacks
Uncover the differences between private vs. public cloud security -- as well as hybrid cloud security and multi-cloud security -- before deciding on an enterprise deployment model Continue Reading
By- Andrew Froehlich, West Gate Networks
 - Sharon Shea, Executive Editor
 
 - 
                Tip
                25 Mar 2024
                
Cloud account hijacking: How it works and how to prevent it
The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise. Continue Reading
By- Ed Moyle, Drake Software
 
 - 
                Tip
                22 Mar 2024
                
How to build a data protection policy, with template
Enterprises can't afford to operate without a sound data protection policy that specifies business goals, stakeholders, regulatory obligations, data classifications and access. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
 
 - 
                News
                21 Mar 2024
                
AWS fixes 'FlowFixation' vulnerability for account hijacking
A Tenable researcher discovered a session fixation flaw in AWS Managed Workflows for Apache Airflow that, combined with a misconfiguration, could enable account hijacking. Continue Reading
By- Alexander Culafi, Senior News Writer
 
 - 
                Tip
                21 Mar 2024
                
10 remote work cybersecurity risks and how to prevent them
Larger attack surfaces, limited oversight of data use and more vulnerable technologies are among the security risks faced in remote work environments. Continue Reading
 - 
                Tip
                19 Mar 2024
                
How to manage third-party risk in the cloud
Third parties, including CSPs, remain a weak point in the supply chain. Adding CSPs into your organization's third-party risk management processes is crucial. Continue Reading
By- Dave Shackleford, Voodoo Security
 
 - 
                Definition
                18 Mar 2024
                
cloud application
A cloud application, or cloud app, is a software program where cloud-based and local components work together. Continue Reading
By- Kinza Yasar, Technical Writer
 - Joel Shore, News Writer
 
 - 
                Definition
                18 Mar 2024
                
cloud load balancing
Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Continue Reading
By- Kinza Yasar, Technical Writer
 - Robert Sheldon
 - Nicholas Rando, TechTarget
 
 - 
                Opinion
                15 Mar 2024
                
Cloud detection and response is, and will stay, a team sport
CISOs should push for federated technologies, common processes and formal communications between teams to ensure cloud detection and response is effective and efficient. Continue Reading
By- Jon Oltsik, Analyst Emeritus
 - 
                    Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
 
 - 
                Definition
                14 Mar 2024
                
cloud encryption
Cloud encryption is a service cloud storage providers offer whereby a customer's data is transformed using encryption algorithms from plaintext into ciphertext and stored in the cloud. Continue Reading
By- Cameron Hashemi-Pour, Site Editor
 - Michael Cobb
 - Rachel Kossman, TechTarget