Cloud computing security
Cloud computing security continues to be one of the biggest concerns and challenges for enterprises. Learn various best practices related to encryption, authorization and identity management to protect cloud infrastructure, data, applications and more. Evaluate various cloud provider-native and third-party security tools to protect critical workloads.
New & Notable
Cloud computing security News
-
May 16, 2019
16
May'19
ZombieLoad: More side channel attacks put Intel chips at risk
Another set of side channel vulnerabilities were discovered in Intel chips. Security researchers explain the risks posed by the flaws and offer advice on mitigation steps.
-
February 26, 2019
26
Feb'19
Eclypsium: Bare-metal cloud servers vulnerable to firmware attacks
Eclypsium found IBM SoftLayer cloud services are vulnerable to what it calls Cloudborne, which allows threat actors to make small, but potentially deadly firmware changes.
-
January 31, 2019
31
Jan'19
Data leak exposes list of Rubrik backup customers
A security snafu left a server containing Rubrik customer information -- including names and contact information -- exposed. Rubrik claims no customer-owned data was leaked.
Cloud computing security Get Started
Bring yourself up to speed with our introductory content
-
Cloud-native security architecture principles and controls
Building a sound cloud security framework is challenging, and it's even more so when implementing a cloud-native architecture. Here are steps you can take to make the job easier. Continue Reading
-
BSA | The Software Alliance
BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth. Continue Reading
-
shadow password file
A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system. Continue Reading
Evaluate Cloud computing security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Azure MFA NPS extension boosts authentication capabilities
With help from the Network Policy Server extension, organizations can expand their on-premises authentication features by tapping into Microsoft's cloud. Continue Reading
-
The complete Secure Access Service Edge (SASE) guide
SASE helps organizations manage and secure external traffic. But is it the best choice for your environment? Find out how to buy, deploy and manage SASE in this adoption guide. Continue Reading
-
Azure Information Protection P1 vs. P2: What's the difference?
Azure Information Protection adds security to files such as sensitive emails and files copied to flash drives. See which features Microsoft offers in its two licensing levels. Continue Reading
Manage Cloud computing security
Learn to apply best practices and optimize your operations.
-
Fine-tune Exchange Online security for your organization
After a move to Microsoft's hosted email service, Exchange admins must learn how to tailor the integrated and supplemental security features to cover several threat scenarios. Continue Reading
-
Boost security with Office 365 privileged access management
Understand how to thwart cyber attacks on privileged user accounts on Microsoft's collaboration platform to avoid becoming that next security breach statistic. Continue Reading
-
Stay in control with Azure AD Privileged Identity Management
Rampant use of elevated privileges can prove hazardous to enterprises. Rein in access and manage resource access with help from this Azure Active Directory feature. Continue Reading
Problem Solve Cloud computing security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Top 5 cloud storage security issues and how to contain them
A handful of major cloud storage security issues, such as insufficient access controls and compliance, remain. Learn how to successfully address them with guidance from IT experts. Continue Reading
-
Microsoft Cloud App Security aims to expand your defenses
Data center security tools have little control over the plethora of SaaS apps used in the enterprise. A Microsoft offering attempts to bridge that gap to ward off threats. Continue Reading
-
Overcome common cloud backup security issues in remote work
Your cloud backup and storage usage may be on the rise. Make sure you take the necessary security precautions detailed here to keep your data protected. Continue Reading