SearchCloudSecurity
New & Notable
Problem Solve
Understanding the Flip Feng Shui exploit
The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle explains how the exploit works and how to deal with it.
Evaluate
How cloud-based endpoint security protects enterprises
Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of these products and how they benefit enterprises.
Evaluate
How multiparty computation can improve cloud security
Microsoft's new service, Secure Data Exchange, can help protect cloud data while in transit and at rest. Expert Rob Shapland looks at the service and how it works for enterprises.
Manage
Cloud access control best practices for enterprises
Privileged user management is important for enterprises operating on the cloud. Expert Dave Shackleford discusses some best practices to help secure cloud access control.
Download Now: What’s the “Real Cost” of Cloud Security?
Access this handbook for advice on planning a secure and effective cloud implementation. Our security expert examines challenges that arise during planning, industry best practices, the main players, and the “real cost” of cloud security.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Trending Topics
-
Private and Hybrid Clouds Evaluate
SIEM as a service considerations for enterprises
There's been increased interest in SIEM as a service and enterprises need to get to know the model before using it. Expert Frank Siemons explains what's different about it.
-
Public Clouds Get Started
Do shared responsibility models cover everything?
Many cloud providers now offer a shared responsibility model for their customers. Expert Dave Shackleford looks at the major providers' models and what they might be missing.
-
Data Protection Evaluate
How cloud-based endpoint security protects enterprises
Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of these products and how they benefit enterprises.
-
Standards Manage
Integrating cloud services into IT security standards
Enterprises should consider a cloud security policy in the wake of more services moving to the cloud. Expert Mike Chapple examines how IT security standards can be reworked.
-
Virtualization Problem Solve
Understanding the Flip Feng Shui exploit
The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle explains how the exploit works and how to deal with it.
-
IAM Manage
Cloud access control best practices for enterprises
Privileged user management is important for enterprises operating on the cloud. Expert Dave Shackleford discusses some best practices to help secure cloud access control.
Topics Covered
-
Cloud Computing Compliance, Audit and Data Governance (6) +
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
-
Cloud Security Management and Cloud Operations Security (6) +
- Cloud Data Storage, Encryption and Data Protection Best Practices
- Cloud Network Security Trends and Tactics
- Cloud Patch Management and Cloud Configuration Management
- Cloud Provisioning and Cloud Identity Management Issues
- Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
- Legacy Application Modernization for the Cloud
-
Security in the Cloud: Cloud Computing Architecture (5) +
Have a question for an expert?
Please add a title for your question
Get answers from your peers on your most technical Cloud Security challenges.
Meet all of our Cloud Security experts
View all Cloud Security questions and answers
Find Solutions For Your Project
-
Evaluate
How cloud-based endpoint security protects enterprises
Cloud endpoint protection products are outpacing standard endpoint protections. Expert Frank Siemons discusses the evolution of these products and how they benefit enterprises.
-
How multiparty computation can improve cloud security
-
How does Project Springfield work as a cloud service?
-
What to look for in cloud collaboration apps
-
-
Problem Solve
Understanding the Flip Feng Shui exploit
The Flip Feng Shui attack against hypervisors could have both short and long-term effects on enterprises. Expert Ed Moyle explains how the exploit works and how to deal with it.
-
What enterprises need to know about cloud DDoS attacks
-
It's time to clarify ownership of risks in the cloud
-
Straddling the security divide between on premises and cloud
-
-
Manage
What to know about isolating cloud instances
VM isolation techniques are good strategies to prevent infections from spreading to the entire cloud environment. Ed Moyle explains what enterprises need to know about isolation.
-
Cloud access control best practices for enterprises
-
Western Union security strategy for cloud services
-
How to secure PaaS environments and reduce risks
-
Cloud Security Basics
-
Get Started
What enterprises need to know about cloud DDoS attacks
Suffering a cloud DDoS attack is now more likely than ever. Expert Frank Siemons discusses what enterprises need to know about these attacks and how to prevent them.
-
Get Started
How to start formulating cloud incident response plans
A cloud incident response plan can be difficult to assemble. Expert Rob Shapland discusses the basics of what to include in a response plan when the incident involves the cloud.
-
Get Started
Do shared responsibility models cover everything?
Many cloud providers now offer a shared responsibility model for their customers. Expert Dave Shackleford looks at the major providers' models and what they might be missing.
Vendor Resources
- The Evolution of Cloud Security: Perception vs. Reality –White Paper
- 5 Keys to Boosting Cloud Security Confidence –Webcast
- Go Beyond Just Securing Your Cloud, Make it Better –Resource Center
Multimedia
-
News
View All -
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
Azure-based fuzz testing service previewed by Microsoft
Microsoft's 'million-dollar bug detector' on offer in preview of Project Springfield, an Azure-based fuzz testing service announced at Ignite 2016.
-
Cloud Computing Software as a Service (SaaS) Security
CASB market shrinks as Oracle snags Palerra
At its OpenWorld Conference in San Francisco, Oracle announced an agreement to acquire cloud access security broker startup Palerra to get into the CASB market.
-
Cloud Network Security Trends and Tactics
Netskope reports on growing cloud ransomware threats
Netskope cloud report reveals growth in threat from cloud ransomware as infected enterprises average 26 files carrying malware, over half of infected files shared publicly.
SearchCloudSecurity Definitions
- AWS CloudTrail
- cloud access security broker (CASB)
- CAIQ (Consensus Assessments Initiative Questionnaire)
- Microsoft Cloud Security Readiness Tool (CSRT)


