Profile

Cover photo
100 followers|4,749 views
AboutPostsPhotosVideos

Stream

 
The secret recipe behind the averted reboot could be a big advantage for AWS.
1
Add a comment...
 
What SSH security techniques is your enterprise using?
1
Add a comment...
1
Add a comment...
 
Recent announcements show how AWS is committed to improving cloud security.
1
Add a comment...
 
Your enterprise won't be immune to downtime just because it's using cloud services.
1
Add a comment...
Have them in circles
100 people
IT Knowledge Exchange's profile photo
Ben Rubenstein's profile photo
SearchEnterpriseWAN.com's profile photo
SearchDomino.com's profile photo
Mark Fontecchio's profile photo
Ivan Milevskii's profile photo
SearchFinancialSecurity.com's profile photo
SearchCloudProvider.com's profile photo
SearchSOA.com's profile photo
 
AWS KMS may very well be the most affordable key management product available for the cloud today.
1
Add a comment...
 
Do cloud security certifications outweigh real-world experience?
Expert Sean Martin looks at some of the most prominent cloud security certifications in the industry and examines their value for security professionals and enterprises.
1
Add a comment...
 
Box is making good on its promise to introduce a bring-your-own-key service.
1
Add a comment...
 
"We must ensure that individuals and organizations can have confidence in the rules and processes that have been put in place to safeguard privacy."
1
Add a comment...
 
Some things do not belong on the internet - but it's not that simple anymore.
In the wake of the celebrity iCloud hack, it's time for enterprises to conduct a data inventory. Expert Char Sample discusses how determining data value can reduce cloud storage risks.
1
Add a comment...
 
"Cloud shadow IT is not a bad thing. We need to get on board rather than put up a barrier to it."
1
Add a comment...
Story
Tagline
The latest updates and analysis on cloud security risks
Introduction
SearchCloudSecurity.com, part of the TechTarget network offers cloud security news and insight on risk management, data governance and compliance, virtualization security, cloud deployment strategies, SaaS, PaaS, IaaS and more.