Data security in the cloud News
January 12, 2017
A new Google Cloud Key Management Service attempts to keep pace with AWS and Azure with an important feature for highly regulated industries and enterprises that operate on its cloud.
November 09, 2016
Public cloud and big banks weren't always a good fit, but financial juggernauts have gone beyond their four walls to test the waters of hyperscale cloud computing.
August 11, 2016
Google Cloud Platform kicked off August by adding security features, dropping prices and buying an ISV-focused startup, but networking continues to be a bugaboo.
July 20, 2016
Data privacy continues to be a hot-button issue on both sides of the Atlantic, with the Privacy Shield agreement and a big win for Microsoft providing some clarity to this still murky issue.
Data security in the cloud Get Started
Bring yourself up to speed with our introductory content
Azure Security Center offers tools to monitor and manage VMs and cloud resources within the Azure cloud. Learn about its features for threat detection, security policies and more. Continue Reading
While the cloud may be flexible and cost-efficient, a lack of data safeguards and compliance standards makes security the largest hurdle to leap. Continue Reading
Microsoft Azure Security Center is a set of tools and services for securing virtual machines that run on the Azure public cloud. With Azure Security Center, an IT team can establish security policies, set up alerts and receive recommendations for ... Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Data security in the cloud Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud security concerns may be less prominent in the enterprise, but users and vendors still need to work to ensure data stays safe, especially in higher-level services. Continue Reading
Enterprises have a love/hate relationship with shadow IT. When it comes with risks, its presence also drives technological innovation. Find out how to make shadow IT work for your enterprise. Continue Reading
As ransomware attacks become more sophisticated, cloud-based applications are at risk. Use continuous backup and educate end users to protect your data and apps. Continue Reading
Manage Data security in the cloud
Learn to apply best practices and optimize your operations.
The old security rules don't apply when moving workloads to the cloud. These cloud security tips will help you make the right decision. Continue Reading
To increase security and monitor user access to public cloud resources such as compute and APIs, admins can use federated identity and access management. Continue Reading
Security is the number one concern for enterprise IT when it comes to public cloud. Use these five tips to determine the security tools and strategies that will work best for you. Continue Reading
Problem Solve Data security in the cloud Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out of sync? Continue Reading
From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process. Continue Reading
Typically a cloud workload doesn't stay in one spot. Expert Dave Shackleford discusses the best ways to secure traveling cloud workloads as they move across environments. Continue Reading