By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Data security in the cloud News
January 12, 2017
A new Google Cloud Key Management Service attempts to keep pace with AWS and Azure with an important feature for highly regulated industries and enterprises that operate on its cloud.
November 09, 2016
Public cloud and big banks weren't always a good fit, but financial juggernauts have gone beyond their four walls to test the waters of hyperscale cloud computing.
August 11, 2016
Google Cloud Platform kicked off August by adding security features, dropping prices and buying an ISV-focused startup, but networking continues to be a bugaboo.
July 20, 2016
Data privacy continues to be a hot-button issue on both sides of the Atlantic, with the Privacy Shield agreement and a big win for Microsoft providing some clarity to this still murky issue.
Data security in the cloud Get Started
Bring yourself up to speed with our introductory content
By controlling who sees what, identity and access management tools give a business a much better hand to play in the always tricky cloud security game. Continue Reading
A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability. Continue Reading
Azure Security Center offers tools to monitor and manage VMs and cloud resources within the Azure cloud. Learn about its features for threat detection, security policies and more. Continue Reading
Evaluate Data security in the cloud Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
Cloud-based security tools can offer healthcare organizations around-the-clock monitoring and protection at a fraction of the cost of traditional on-premises tools. Continue Reading
IT policies must explicitly establish the identity of users and their rights to access resources. Otherwise, an organization will not meet the requirements of cloud computing. Continue Reading
Manage Data security in the cloud
Learn to apply best practices and optimize your operations.
A cloud-era shadow IT policy still needs to manage risk, but the era of "no way" is giving way to allow users quick access to the productivity apps they need. Continue Reading
The old security rules don't apply when moving workloads to the cloud. These cloud security tips will help you make the right decision. Continue Reading
To increase security and monitor user access to public cloud resources such as compute and APIs, admins can use federated identity and access management. Continue Reading
Problem Solve Data security in the cloud Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out of sync? Continue Reading
From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process. Continue Reading
Typically a cloud workload doesn't stay in one spot. Expert Dave Shackleford discusses the best ways to secure traveling cloud workloads as they move across environments. Continue Reading