Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

Hacking stealing password data

Hacker in silouhette at laptop

Don’t leave your Amazon S3 buckets exposed

Although the default settings keep S3 data private, configuration errors have exposed data to the world. Even the NSA has screwed up

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

chick hatching egg

3 emerging cloud technologies for enterprise

Most enterprises manage more than 10,000—and that’s with only 20 percent of their workloads in the cloud. New cloud tech is emerging to help

Cloud computing security lock.

5 key observations on cloud-native security

Cloud-native security's meta policy around security layers allows the devops or cloud teams to operate it as seamlessly as possible

security incident responder

Centralized security in the cloud is the best security model

Sadly, enterprises don't like the idea of a central trust service in the cloud to secure both their cloud and local systems

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

cloud security ts

A better model for cloud security

How Bracket Computing uses full workload isolation to secure the hybrid cloud without disrupting developer workflow

cloud security

How cloud-native security can prevent modern attacks

Cloud-native security can prevent modern attacks. Here's why and how

secret

How to keep container secrets secret

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

security software programmer primary

3 reasons cloud-native is the next evolution in enterprise security

Cloud-native is the next evolution for security in the enterprise, because it gives every organization the ability to use the same tools and processes used by modern fast-moving organizations, such as Airbnb, Google and Facebook. It’s...

cloud blueprint schematic

Attack and response: Cloud-native cybersecurity vs. virtual machine security

Securing containers and cloud-native workloads is different than securing virtual machines (VMs), and it all starts with understanding attack and response and the ever-evolving nature of threats.

Cloud_Security
video

Who's responsible for cloud security? | Tech Talk Pilot Episode, Pt 2

IDG editors talk about the common misperceptions about public cloud storage, including who's ultimately responsible for data security.

snake fang attack

The latest cyber attacks show why the cloud is safer

No major cloud provider has fallen victim to all the malware attacks of the last few years. What does that tell you?

cloud security lock

Security in a cloud-native environment

Cloud-native design can offer tremendous security—but getting there needs a structured design approach to safeguard enterprise systems and data

1 incident response police tape crime death

The 2 cloud security myths that must die

Too many people treat cloud security as a black-and-white proposition, which risks wasting lots of money or having security gaps—or both

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs

windows cloud

Move to the cloud: The barriers are all removed

If you have been contemplating a move to the cloud, the time is now. All the traditional barriers have been removed.

mit anonymity Riffle privacy

Data security and the cloud: Earn trust by putting your customers in control

Giving customers control over who can access their sensitive data can go a long way toward helping the cloud industry reduce fears and earn trust.

Load More