New & Notable
Cloud computing security News
August 25, 2021
Microsoft's Azure Government Top Secret offers more than 60 cloud services to U.S. spy agencies, the Department of Defense and federal civilian organizations.
April 09, 2021
IBM doubles down on its investment in vertical markets, rolling out a financial services cloud that shares workloads with clouds in telecommunications and healthcare.
February 04, 2020
HPE has scooped up Scytale, a startup that has developed a cloud-native security framework for highly distributed applications. While most enterprises don't need such capabilities today, HPE has taken a step that could serve them down the road.
December 19, 2019
Hybrid and multi-cloud approaches evolved in 2019, cost management efforts rose and deployment options vied for dominance. Those trends are all likely to continue through 2020.
Cloud computing security Get Started
Bring yourself up to speed with our introductory content
A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system. Continue Reading
The cloud-native application protection platform, or CNAPP, is the latest in a slew of cloud security acronyms. Learn what it is and why the concept should stick around. Continue Reading
Learn how to make an AWS IAM user and assign an access policy to the user with a few commands. This detailed tutorial includes screenshots to guide you through the steps. Continue Reading
Evaluate Cloud computing security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When your IT team needs more detailed info about resource activity in AWS, they have options. See how AWS Cloudtrail and Config resource monitoring tools compare. Continue Reading
'Cloud native' has described applications and services for years, but its place in security is less clear. Get insight into cloud-native security from expert Dave Shackleford. Continue Reading
Expert Carla Roncato explains what organizations need to know about emerging digital identity and security trends for the cloud, including CASB, CIEM and zero trust. Continue Reading
Manage Cloud computing security
Learn to apply best practices and optimize your operations.
While it's inevitable that certain cloud-hosted applications will share resources, the vulnerabilities these connections expose make isolation strategies an absolute necessity. Continue Reading
After a move to Microsoft's hosted email service, Exchange admins must learn how to tailor the integrated and supplemental security features to cover several threat scenarios. Continue Reading
Understand how to thwart cyber attacks on privileged user accounts on Microsoft's collaboration platform to avoid becoming that next security breach statistic. Continue Reading
Problem Solve Cloud computing security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
An organization that wants to control its cloud environment should examine how well it adheres to these key pillars of cloud governance. Continue Reading
A handful of major cloud storage security issues, such as insufficient access controls and compliance, remain. Learn how to successfully address them with guidance from IT experts. Continue Reading
Data center security tools have little control over the plethora of SaaS apps used in the enterprise. A Microsoft offering attempts to bridge that gap to ward off threats. Continue Reading