Data security in the cloud News
May 02, 2016
New Google security certifications are welcome, if belated, additions to the cloud platform, providing assurances to enterprise customers about protecting their data.
February 08, 2016
Container security is central to CoreOS' first production release of container runtime rkt, which it sees as better suited than Docker for large-scale deployments.
January 12, 2016
Linode's response to a series of cloud security threats to its hosting service illustrates the balancing act of providing the appropriate level of information to users to assuage their concerns.
November 18, 2015
Docker has added greater control for IT ops and new container security tools, along with its containers as a service offering.
Data security in the cloud Get Started
Bring yourself up to speed with our introductory content
When it comes to data backup in the cloud, there's no one-size-fits-all approach -- so be sure to select your backup services carefully. Continue Reading
To minimize shadow IT risks in the enterprise, some IT pros find that adhering to the old adage, 'if you can't beat 'em, join 'em' is the best approach. Continue Reading
Docker Content Trust is a security feature for Docker containers that uses cryptographic keys to ensure container images are not comprised. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Data security in the cloud Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises are adding cloud access security brokers to their tool chain to protect data as it moves between on-premises and cloud provider platforms. Continue Reading
Many public cloud providers share security responsibilities with their users. But how does that work in a multicloud model? Continue Reading
The interoperability hurdles that still exist in multicloud environments can create new security headaches for enterprise IT teams. Continue Reading
Manage Data security in the cloud
Learn to apply best practices and optimize your operations.
Failing to see the difference between resiliency and data recovery, many organizations overlook the importance of having a cloud backup strategy. Continue Reading
Identity and access management tools play a critical role in enterprise cloud security. But remember to carefully consider your requirements before jumping in. Continue Reading
The growing popularity of cloud computing means an increasing number of end users are interacting with the cloud. This reality creates more vulnerabilities and identity management headaches for IT teams. This handbook examines these challenges, ... Continue Reading
Problem Solve Data security in the cloud Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While open source technologies can deliver big benefits, they can also stir up concerns for IT pros -- particularly around security and integration. Continue Reading
With Halloween creeping in, cloud expert David Linthicum shares three cloud computing horror stories -- and advice for not finding yourself in one. Continue Reading
Performing an end-to-end penetration test for public cloud is a must to prevent malicious attacks from both internal and external sources. Continue Reading