Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

CSO  >  An exclamation-mark alert in a field of abstract technology.
covering his eyes bu004744 100266305 orig

uh oh oops mistake it malfunction blunder ben franklin bby dny59 getty 175531215

3 cloud architecture mistakes we all make, but shouldn’t

Are we getting good at cloud architecture, or do we still have a lot to learn?

security threat / hacker / attack

The cloud attack you didn’t see coming

If stealth hacking hasn’t already come to cloud computing, it will shortly. Protect yourself by knowing your responsibilities and using effective tools.

cloud security ts

The pandemic-driven rush to cloud is compromising security

COVID-19 has been a boon for cloud computing. However, the haste to move to cloud is causing some enterprises to neglect security. Here’s what you need to look out for.

IDG edit cubicles wide-angle lens iphone 6S

How we’ll use cloud when we go back to work

We’ve proactively enabled a new remote workforce this past year, but some may return to the office soon. Better start planning.

A home workspace displays a sign marking the new normal.

The new normal needs new cloud security

IT leaders now question the effectiveness of security that was built before remote work spiked the use of cloud computing. Do their defenses hold up under widely distributed use?

cubes - blocks - squares - containers - storage - repository

Containers require good architecture

They may seem simple, but containers require a whole new architecture skill set. Here’s what you need to know.

the list smartphone resolutions

My 2021 cloud computing New Year’s resolutions

It’s that time of year to make promises to yourself you’ll never keep. Perhaps these cloud-related improvements will be different.

cso security hack control center breach gettyimages 808157576 by gorodenkoff 2400x1600px

What will cloud security look like in 3 years?

Cloud security has been better than on-premises security for several years now. Increased automation and interoperability will cement its position as a best practice.

A woman is about to step on a banana peel on a binary floor. / risks / mistakes / vulnerabilities

Why you’re doing cloudops wrong

Now that operational best practices for cloud computing are well known, why do mistakes keep piling up?

lawsuit judge law court decision sued money

Dealing with sovereign data in the cloud

International regulations make dealing with cloud-based data a nightmare. These fundamental concepts can help keep you from running afoul of data sovereignty laws

cloud security ts

9 ways to build privacy into your cloud applications

Look to these strategies to balance privacy with functionality and protect your applications and data against attacks in the cloud

Multiple individual cloud instances / cloud deployments

CIO Think Tank: Setting the multi-cloud agenda

How can enterprises handle the complexity of multiple clouds — and reap unprecedented benefits? In a series of virtual roundtables, 30 IT leaders articulated the challenges and delivered insightful recommendations.

Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.

Cloudops tools: More is not better

Cloudops and cloudops tools (such as AIops) are important, but you can have too much of a good thing

vault protected safe clouds breach security

Yes, it's safe to move sensitive data to the cloud

The public clouds have been safe places to store mission-critical and sensitive data for some time, but it takes a pandemic to push most enterprises over the tipping point

field notes / journal / lessons / learning / casestudy

3 things the pandemic taught us about cloud computing

Many enterprises are learning some hard lessons they did not even know existed four months ago

ifw man thinking strategic it binary curious ponder questions by akurtz getty images and thinkstock

The post-pandemic move to edge computing requires some thought

With a newly expanded distributed workforce, many enterprises are considering a move to the edge. Make sure you've thought about security and data volume

colorful network wires tied in a knot

Cloud complexity is a threat to data security

One study shows what many of us already suspected: Cloud complexity makes data more vulnerable, even with the best security practices and technologies in place

10 AWS configuration mistakes and how to avoid them

3 cloud security mistakes you’re likely making without knowing

Moving to a post-pandemic cloud deployment? You can easily avoid these security errors

Load More