Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

basics / building a foundation / how-to / process / steps / stacking blocks
10 cloud security breach virtualization wireless

Security guard conducting surveillance by watching several monitors 178602930

What observability means for cloud operations

When you look at your operations data, do you know what you’re seeing? Observability can help you gain more insights from complex cloud deployments.

worried man with hands on face scared nervous fearful

Cloud architects are afraid of automation

Automation is one of the greatest gifts to cloud architecture, operations, security, and finops. Yet, many architects still are reluctant to use it. What's so scary?

cloud computing / cloud network

Qualys previews TotalCloud FlexScan for multicloud security management

Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.

'Job Openings' LED display signage with abstracted circuits. [ hiring / job opportunities ]

3 primo cloud computing jobs in 2023

The cloud boom and its resulting issues are boosting the pay and prestige of certain roles. Here's what it takes to be an architect, operations engineer, or security engineer.

cyber terrorism dynamite on laptop explode blow up binary

Why you’re getting cloud security wrong

New data shows that many enterprises are not approaching cloud security correctly, and it’s going to lead to unpleasant consequences.

One lock in a series is unlocked / weakness / vulnerability

It’s time to prioritize SaaS security

Did our focus on IaaS security come at the expense of SaaS security? Know what to guard against, especially excessive user permissions and misconfigured UIs, APIs, and integrations.

Multiple keys.

Public package repos expose thousands of API security tokens—and they’re active

JFrog’s new Xray Secrets Detection uncovered active access tokens in popular open-source software registries including Docker, npm, and PyPI. Here are our findings and takeaways.

10 cloud security breach virtualization wireless

Cloud security is the new battle zone

Attempted breaches are on the rise and cloud security professionals are forced to play 'Whac-A-Mole' with attacks. Are you ready to rethink your cloud security strategy yet?

Giant padlock with blue sky on the background 179693980

Why developers hold the key to cloud security

Developer-first security is the future in the cloud. Because the responsibility for cloud security rests with developers and devops teams, not IT security.

post 3 image how hardened vms can help with cloud security 1

Cryptojacking, DDoS attacks increase in container-based cloud systems

Victims lose $53 for every $1 cryptojackers gain, according to a new report from Sysdig.

A remote worker works from home with tablet, documents, notebook and pen.

Cloud’s key role in the emerging hybrid workforce

Hybrid work would not be possible without cloud computing. However, enterprises should address these mistakes before they kill productivity.

winners loser tech gear 2016

3 wins and 3 losses for cloud computing

The good, the bad, and the ugly of a decade of cloud computing: Security and agility are definite wins, but cost and complexity are serious drawbacks.

tall blue buildings skyscrapers enterprise cityscape

3 multicloud lessons for cloud architects

Designing and deploying a single cloud architecture may not prepare you to take on a multicloud, especially where security and cost optimization are concerned.

interconnecting gears on a keyboard / process / automation / machinery / mechanism / efficiency

Automation is the ultimate cloud security tip

Manual cloud security often leads to a major breach. Helping leadership understand the risks can make the case for funding to do it right.

bucket with holes breach security vulnerability

Kubescape boosts Kubernetes scanning capabilities

End-to-end open source security platform for Kubernetes has added vulnerability scanning for code repositories and container image registries.

cloud security data breach crime accessible

It’s past time to figure out cross-cloud security

The people deploying multicloud will tell you that 'security is a nightmare.' Cross-cloud abstraction and automation of security services is the right solution.

22 dg 040 watch out 2022 top global cloud threats

CrowdStrike enhances container visibility and threat hunting capabilities

The cloud-native security provider wants to help customers gain visibility into all of their containers, as well as uncover a growing array of threats across multicloud environments.

security threat / hacker / attack

Cloud security risks remain very human

Most of us picture cloud security threats as bad actors in some hostile country. More often, it’s you and your coworkers.

Load More