Items Tagged with "Cloud Security"
Holding public cloud security to account
August 10, 2020 Added by:Avishai Wool
The public cloud provides great flexibility and cost management for organizations, but what about security?
Comments (0)
Ending the Cloud Security Blame Game
July 08, 2020 Added by:Avishai Wool
Security is primarily your responsibility – with help from the cloud provider.
Comments (0)
Myth Busters: How to Securely Migrate to the Cloud
October 17, 2019 Added by:Bill Saltys
Security must remain a top priority for IT professionals during the migration process, and there is a successful pathway to safely and securely migrate to the cloud.
Comments (0)
5 Limitations of Network-Centric Security in the Cloud
August 19, 2019 Added by:Sanjay Kalra
Traditional security solutions aim to identify threats at the perimeter of the enterprise, but threats targeting public clouds require a different level of insight and action.
Comments (0)
Today’s Top Public Cloud Security Threats …And How to Thwart Them
June 21, 2019 Added by:Michael Koyfman
In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.
Comments (0)
Next Generation Firewalls are Old News in the Cloud
March 27, 2019 Added by:Sanjay Kalra
As users start to change the way they deploy infrastructure to the cloud, they will also need to find security solutions that are built by using the cloud in order to secure the cloud.
Comments (0)
6 Ways to Use CloudTrail to Improve AWS Security
October 02, 2018 Added by:Sanjay Kalra
Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition.
Comments (0)
Plug Your Cloud Cybersecurity Holes
July 26, 2018 Added by:Marie Hattar
Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.
Comments (0)
Cloud Security Alert – Log Files Are Not the Answer
April 18, 2018 Added by:Lora O'Haver
Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.
Comments (0)
Avoiding Holes in Your AWS Buckets
April 12, 2018 Added by:Sanjay Kalra
Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.
Comments (0)
What Global Manufacturers Need to Know About Security in the Cloud
January 08, 2018 Added by:Srivats Ramaswami
Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.
Comments (0)
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
December 22, 2017 Added by:Sanjay Kalra
Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.
Comments (0)
4 Questions Businesses Must Ask Before Moving Identity into the Cloud
November 08, 2017 Added by:Dave Hendrix
Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.
Comments (0)
Why Cloud Security Is a Shared Responsibility
October 13, 2017 Added by:Sanjay Kalra
If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?
Comments (0)
Put Your S3 Buckets to the Test to Ensure Cloud Fitness
October 13, 2017 Added by:Tim Prendergast
Security measures that are critical to attain the basic level of security for your S3 buckets, which are always going to be a target because they store sensitive data.
Comments (0)
How Does UC in the Cloud Impact Your Security Posture?
July 20, 2017 Added by:Myk Konrad
To maintain the security posture of unified communications, enterprises must implement a holistic approach to security that extends from their infrastructure to the cloud.