Cloud computing security
Cloud computing security continues to be one of the biggest concerns and challenges for enterprises. Learn various best practices related to encryption, authorization and identity management to protect cloud infrastructure, data, applications and more. Evaluate various cloud provider-native and third-party security tools to protect critical workloads.
New & Notable



6 Multi-Cloud Management Tool Must-Haves
To address issues with managing multi-cloud environments, some teams are turning to a cloud management platform to bring disparate environments under control. In this expert guide, explore key features your tool should have to ensure it can meet your organization’s specific requirements.
Cloud computing security News
-
February 04, 2020
04
Feb'20
HPE buys Scytale to hone cloud-native security chops
HPE has scooped up Scytale, a startup that has developed a cloud-native security framework for highly distributed applications. While most enterprises don't need such capabilities today, HPE has taken a step that could serve them down the road.
-
December 19, 2019
19
Dec'19
Hybrid, cost management cloud trends to continue in 2020
Hybrid and multi-cloud approaches evolved in 2019, cost management efforts rose and deployment options vied for dominance. Those trends are all likely to continue through 2020.
-
December 12, 2019
12
Dec'19
McAfee launches security tool Mvision Cloud for Containers
Cloud security posture management, container images vulnerability scanning and DevOps integration are among features included in McAfee Mvision Cloud for Containers.
-
November 14, 2019
14
Nov'19
Google to unveil post-Chronicle cloud cybersecurity plans
Google plans to discuss its cloud cybersecurity portfolio at a conference next week, with the capabilities developed by Chronicle figuring heavily into the mix.
Cloud computing security Get Started
Bring yourself up to speed with our introductory content
-
Organize a cloud IAM team to secure software-defined assets
Building a cloud IAM team with the necessary technical expertise and soft skills is key to securely managing IAM in complex cloud environments. Continue Reading
-
Top cloud compliance standards and how to use them
Get guidance on how to select relevant cloud compliance standards, along with tips on evaluating third-party providers' cloud compliance and governance efforts. Continue Reading
-
Cloud security: The building blocks of a secure foundation
Before going ahead with digital transformation, ensure your organization has created its cloud security strategy to ensure that moving to the cloud doesn't create vulnerabilities. Continue Reading
Evaluate Cloud computing security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Azure AD Premium P1 vs. P2: Which is right for you?
Azure Active Directory is more than just Active Directory in the cloud. See how the premium editions of the directory service stack up to find the best fit for your organization. Continue Reading
-
How cloud-based SIEM tools benefit SOC teams
It's time for SIEM to enter the cloud age. Learn about the cloud-based SIEM features that can help SOC teams gain a holistic view of their organization's cloud infrastructure. Continue Reading
-
Cognito user pools vs. identity pools -- what AWS users should know
Familiarize yourself with user pools and identity pools in Amazon Cognito and learn how to better protect your workloads in a cloud environment. Continue Reading
Manage Cloud computing security
Learn to apply best practices and optimize your operations.
-
6 SaaS security best practices to protect applications
Use these SaaS security best practices to ensure your users' and organization's SaaS use stays as protected as the rest of your enterprise applications. Continue Reading
-
How to build a cloud security operations center
To better protect workloads and data in the cloud, security operations centers collaborate with various IT teams. Learn how to cloud-enable your organization's SOC. Continue Reading
-
How public cloud vendors tackle confidential computing
Confidential computing is an emerging cloud technology, and the major cloud platforms have all addressed it with different strategies around usability and scale. Continue Reading
Problem Solve Cloud computing security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Overcome common cloud backup security issues in remote work
Your cloud backup and storage usage may be on the rise. Make sure you take the necessary security precautions detailed here to keep your data protected. Continue Reading
-
Confront cloud security challenges with these 5 tips
Security gets complicated when the cloud overlaps with other technologies, such as AI and serverless. Review these common risks, and learn how to prevent attacks. Continue Reading
-
How do I store secrets in AWS so they don't appear in my code?
To secure a cloud environment, IT teams must keep their application's secrets under wraps. Learn how AWS users can keep sensitive information out of their code with tools like Secrets Manager. Continue Reading