Cloud security
Download: Compare the cloud services of Azure, AWS, and Google
These three vendors offer services ranging from big data in the cloud to serverless computing and more. Read on for a vendor-neutral comparison by our experts.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Cloud security News
-
May 11, 2017
11
May'17
Healthcare's public cloud adoption highlights market's maturity
The healthcare sector is the latest to show it's ready to embrace the public cloud amid greater familiarity and improved security from the major providers.
-
January 12, 2017
12
Jan'17
Google key management keeps pace with AWS, Azure
A new Google Cloud Key Management Service attempts to keep pace with AWS and Azure with an important feature for highly regulated industries and enterprises that operate on its cloud.
-
November 09, 2016
09
Nov'16
Public cloud and big banks finally on the same page
Public cloud and big banks weren't always a good fit, but financial juggernauts have gone beyond their four walls to test the waters of hyperscale cloud computing.
-
August 11, 2016
11
Aug'16
Google cloud continues enterprise push amid more disruption
Google Cloud Platform kicked off August by adding security features, dropping prices and buying an ISV-focused startup, but networking continues to be a bugaboo.
Cloud security Get Started
Bring yourself up to speed with our introductory content
-
cloud computing
Cloud computing is a general term for the delivery of hosted services over the internet. Continue Reading
-
IAM technologies change the cloud security game
By controlling who sees what, identity and access management tools give a business a much better hand to play in the always tricky cloud security game. Continue Reading
-
shared responsibility model
A shared responsibility model is a cloud security framework that dictates the security obligations of a cloud computing provider and its users to ensure accountability. Continue Reading
Evaluate Cloud security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Use Google KMS to control encryption keys in the cloud
Google offers various encryption options for its public cloud, from default server-side to customer-supplied keys. Learn where its Key Management Service falls in that mix. Continue Reading
-
Five podcasts to catch up on the latest trends in cloud computing
Whether it's vendor partnerships or new services for IoT, the cloud market evolves quickly. Here's a roundup of five podcasts to bring you up to speed on the latest cloud trends. Continue Reading
-
Public sector fuels growth in AWS GovCloud region
AWS caters to public sector users with its GovCloud region, which includes stricter compliance standards. But how popular is the region -- and AWS -- among government agencies? Continue Reading
Manage Cloud security
Learn to apply best practices and optimize your operations.
-
Assess the benefits and risks of compliance as a service
With compliance as a service, organizations can lean more heavily on their cloud providers to ensure adherence with certain regulations -- but not without some risk. Continue Reading
-
Does secure cloud backup exist and how can it be safer?
Despite ransomware and other attacks causing security issues, it is possible to institute safe cloud backup. Access control and testing are among the best practices to follow. Continue Reading
-
How to modify rules in a default OpenStack security group
OpenStack security groups allow admins to control traffic into cloud computing instances. But is it possible to change the rules within a default group? Continue Reading
Problem Solve Cloud security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Curb on-demand self-service risks with cloud inventory management
Shadow IT can create compliance and security issues, as well as increase cloud costs. Take back control with these best practices for cloud inventory management. Continue Reading
-
Avoid new cloud security threats with continuous monitoring, testing
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
-
How do I synchronize MFA devices for public cloud?
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out of sync? Continue Reading