SearchCloudSecurity.com is the Web's most comprehensive resource for cloud security news, analysis and case studies. Learn who the key players are and how they rate against each other, how the technology works, and how you consume and pay for it. Plus, access case studies of successful deployments in the cloud with explanations of new business opportunities and how to tap into them.
View the complete archive of Cloud Security news, research and expert advice.
Go to SearchCloudSecurity.comRecently on SearchCloudSecurity.com
Cloud API security risks: How to assess cloud service provider APIs
The CSA says cloud API security is a top threat to cloud environments. Expert Dave Shackleford explains how to assess the security of providers' APIs.
-
More Highlights
-
Evaluating cloud-based disaster recovery service options
What considerations should be made when adopting a cloud-based disaster recov...
-
Cloud IAM: Creating connectors for dynamic cloud provisioning of users
Implementing dynamic provisioning between an enterprise and a cloud service p...
-
Cloud security standards provide assessment guidelines
The Cloud Security Alliance Cloud Controls Matrix helps cloud providers and c...
-
-
Definitions
-
information-centric security
Information-centric security is an approach to information security paradigm ...
-
Trusted Cloud Initiative
The Trusted Cloud Initiative is a program of the Cloud Security Alliance indu...
-
Cloudburst VM escape
Cloudburst VM (virtual machine) escape is an exploit method, credited to rese...
-
Browse CloudSecurity Topics
-
Cloud Computing Compliance, Audit and Data Governance
Learn how to maintain cloud computing compliance with government regulations and industry standards when moving IT operations and applications to a cloud environment. Also learn... More about Cloud Computing Compliance, Audit and Data Governance
-
Recent Definitions
-
Trusted Cloud Initiative
- The Trusted Cloud Initiative is a program of the Cloud Security Alliance industry group created to help cloud service providers develop indus... -
Soc 3 (Service Organization Control 3)
- A Service Organization Control 3 (Soc 3) report outlines information related to a service organization’s internal contro... -
Soc 2 (Service Organization Control 2)
- A Service Organization Control 2 (Soc 2) reports on various organizational controls related to security, availability, p...
-
-
Highlights
-
More Cloud Computing Compliance, Audit and Data Governance Topics
-
Security in the Cloud: Cloud Computing Architecture
Before purchasing or building cloud systems and services, learn the cloud computing security considerations and challenges involved the various cloud computing architecture mode... More about Security in the Cloud: Cloud Computing Architecture
-
Recent Definitions
-
homomorphic encryption
- Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form. ... -
cloud bursting
- Cloud bursting is an application deployment model in which an application runs in a private cloud or data center and bursts into a public cloud when the dem... -
cloud computing
- A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the ho...
-
-
Highlights
-
More Security in the Cloud: Cloud Computing Architecture Topics
-
Cloud Security Management and Cloud Operations Security
As your organization moves its infrastructure, applications and data into the cloud, security operations such as network security, vulnerability management, data protection and ... More about Cloud Security Management and Cloud Operations Security
-
Recent Definitions
-
information-centric security
- Information-centric security is an approach to information security paradigm that emphasizes the security of the information itself rat... -
ENISA (European Network and Information Security Agency)
- The European Network and Information Security Agency (ENISA) is a European Union (EU) agency ... -
SPI model (SaaS, PaaS, IaaS)
- SPI is an acronym for the most common cloud computing service models, Software as a Service, Platform as a Service and Infrastructure a...
-
-
Highlights
-
More Cloud Security Management and Cloud Operations Security Topics
Legacy Application Modernization for the Cloud
Cloud Security Services: Cloud-Based Vulnerability Scanning and Antivirus
Cloud Network Security Trends and Tactics
Cloud Provisioning and Cloud Identity Management Issues
Cloud Data Storage, Encryption and Data Protection Best Practices
Cloud Patch Management and Cloud Configuration Management
-
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Virtualization is at the core of any cloud computing initiative, regardless of delivery model or deployment method. Service providers, or internal enterprise private cloud manag... More about Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
-
Recent Definitions
-
Cloudburst VM escape
- Cloudburst VM (virtual machine) escape is an exploit method, credited to research firm Kostya Kortchinsky Immunity Inc., that takes advantage of IB... -
hypervisor security
- Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, includ... -
AV storm
- An AV storm is the performance degradation that occurs when antivirus software simultaneously scans multiple virtual machines (VMs) on a single physical host.
-
-
Highlights