New & Notable
Cloud computing security News
February 04, 2020
HPE has scooped up Scytale, a startup that has developed a cloud-native security framework for highly distributed applications. While most enterprises don't need such capabilities today, HPE has taken a step that could serve them down the road.
December 19, 2019
Hybrid and multi-cloud approaches evolved in 2019, cost management efforts rose and deployment options vied for dominance. Those trends are all likely to continue through 2020.
December 12, 2019
Cloud security posture management, container images vulnerability scanning and DevOps integration are among features included in McAfee Mvision Cloud for Containers.
November 14, 2019
Google plans to discuss its cloud cybersecurity portfolio at a conference next week, with the capabilities developed by Chronicle figuring heavily into the mix.
Cloud computing security Get Started
Bring yourself up to speed with our introductory content
Today's dispersed environments need stronger networking and security architectures. Enter cloud-based Secure Access Service Edge -- a new model for secure network access. Continue Reading
Follow along with this Azure Key Vault tutorial to securely manage passwords and other sensitive information in an Azure DevOps pipeline. Continue Reading
Cloud services use cases continue to expand, but implementation challenges remain. Discover Secure Access Service Edge, or SASE, offerings and how they can simplify connectivity. Continue Reading
Evaluate Cloud computing security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Will the Secure Access Service Edge model be the next big thing in network security? Learn how SASE's expanded definition of identity is fundamental to this emerging access model. Continue Reading
Compare and contrast the mobile testing tools from the big three cloud vendors -- AWS Device Farm, Google Firebase Test Lab and Microsoft Visual Studio App Center Test. Continue Reading
FedRAMP provides a standardized approach to cloud security across the U.S. federal government, but it can also serve as a guidepost for corporations in search of better practices. Continue Reading
Manage Cloud computing security
Learn to apply best practices and optimize your operations.
Cloud sprawl can lead to all sorts of unwanted surprises. Review these recommendations to get control over all the cloud resources across your business. Continue Reading
Has your organization considered outsourcing cloud identity management? Learn more about the benefits of AaaS, aka IDaaS, and what to consider before settling on a particular service. Continue Reading
The shared responsibility model of cloud security keeps data safe -- except when it doesn't. Prevent your workloads from being the next target of hackers. Continue Reading
Problem Solve Cloud computing security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An organization that doesn't fully participate -- or even understand -- its role in securing its data in the public cloud takes unnecessary risks. You need to do your part. Continue Reading
The cloud-based identity and access management service does not come with certain defensive features turned on by default, which administrators should rectify. Continue Reading
The shared responsibility model delineates where company and CSP security responsibilities start and end. This is critical not only for compliance, but also the big security picture. Continue Reading