Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

fence cloud barrier chain link metal
disaster recovery button

Focusing on cloud computing's important role.

Google Cloud sharpens its enterprise strategy

Google used to rely mainly on its technical bona fides to sell its cloud, but now it's meeting customers halfway with new enterprise-friendly capabilities and support

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

video

Cybersecurity and the Cloud in 2017

Infoworld Senior Writer Fahmida Rashid chats with Palo Alto Networks' CSO Rick Howard about the biggest cybersecurity challenges facing businesses working in the cloud in 2017.

buyers remorse cloud computing

How to prevent a bad case of cloud buyer’s remorse

Nearly 40% of organizations with public cloud experience have moved at least some of those workloads back to on premises, mostly due to security and cost concerns

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

cloud comparison

Prepare for liftoff: 9 steps to cloud readiness

Remove head from sand. Resist impulse to hug server. Prepare yourself for the inevitable

quantum computing

Prepare now for the quantum computing revolution in encryption

Quantum computing promises to make current encryption methods obsolete, so enterprises need to start laying the groundwork for new encryption methods

werner vogels aws reinvent 2016

AWS tries to protect its customers from DDoS attacks with new service

Shield is available for free and enabled by default for all web applications running on AWS

life preserver save survivor overboard rescue recover

Azure customer saves Microsoft from an RHEL disaster

Were it not for an alert customer, attackers could have compromised every RHEL instance on Microsoft Azure due to improper configuration of Red Hat Update Appliances

handshake hand shake target bullseye

Google-Intel alliance boosts Kubernetes, machine learning, IoT, and more

Joint projects between Google and Intel point up areas in which both can collaborate, and places where Intel is looking to maintain an edge as the PC market dries up

10 AWS configuration mistakes and how to avoid them

10 AWS security blunders and how to avoid them

Amazon Web Services is easy to work with -- but can easily compromise your environment with a single mistake

cloud security lock

Unlock the next level of cloud security

Cloud providers offer some of the best security in the industry, but you can take an extra protective step with a monitoring service

ibm iot

IBM's IoT blockchain service gets ready to set sail

The cloud-hosted blockchain creates tamper-proof ledgers of data about IoT events

hidden door

IPv6 servers beat IPv4 in security -- for now

Security by obscurity is real. Sucuri's CTO found that while IPv4 servers can get compromised in minutes, IPv6 servers are safe from attack because no one is looking for them

cloud building security

What to do when hackers break into your cloud

Single-tenant breaches can and do happen -- and it's usually IT's fault. Here's how to recover from one and prevent another

army of robots 176859594

Microsoft's cloud dominance comes with a security risk

Microsoft and third parties are layering on more security technology to keep vulnerabilities harder to exploit at scale

scores table workers ratings

Security scores for cloud companies on the way

Businesses will be able to use the Vendor Security Alliance-designed questionnaire to evaluate the security practices of third-party partners

glasses focus clouds buildings

Tenable brings network visibility into Google Cloud Platform

Tenable SecurityCenter Continuous View gives IT administrators visibility over their applications hosted in Google Cloud Platform

Load More