Hosted virtual server

Cloud APIs News

View All News

Cloud APIs Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Cloud APIs Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Cloud APIs

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Cloud APIs Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Sound application development rests with secure APIs in the cloud

    APIs are the secret sauce that simplifies the integration of clouds, data, applications and containers. Learn how to overcome API security risks with this handbook. Continue Reading

  • Enterprise mobile strategy: Step up security

    CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.

    Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.

    Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.

     Continue Reading

  • Are your cloud apps' APIs secure?

    You can never prove that an application is secure; you can prove only that it is not secure. How can that be? Continue Reading

View All Problem Solve