New & Notable
Data Security and Cloud Computing News
May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
April 25, 2014
A new report shows the volume of cloud attacks is rising, as attack types traditionally associated with on-premises environments migrate with users.
February 24, 2014
At the 2014 CSA Summit, presidential cybersecurity advisor Richard Clarke said NSA monitoring efforts are negatively affecting U.S. cloud providers.
February 20, 2014
An NSA-shaped cloud has hovered over the 2014 RSA Conference for months, but the show's agenda and expected attendance belie dark projections.
Data Security and Cloud Computing Get Started
Bring yourself up to speed with our introductory content
Implementing data encryption controls in a cloud environment can be quite challenging for organizations using those services. Ed Moyle discusses the first two steps to implementing data security in the cloud. Continue Reading
Organizations need to implement a wide range of cloud security controls to address a shifting sphere of influence, expert Ravila Helen White explains. Continue Reading
Virtualization and cloud computing are more popular than ever, yet bolted-on security remains the norm. Chris Hoff explains what needs to change. Continue Reading
Evaluate Data Security and Cloud Computing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Big data offers horizontal scalability, but how do you get your database security to scale along with it? Continue Reading
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of loss and exposure. What technologies should be in place to enforce NoSQL security controls on-premises... Continue Reading
See which vendors' offerings our readers voted to be the best cloud security products of the year in our 2013 Readers' Choice Awards. Continue Reading
Product ReviewsPowered by IT Central Station
Top of the list if you're using VMware or Hyper-V. Would be nice to have more supported hyper-visors.Powered by IT Central Station
Use Of Solution: 1 year • Valuable Features: Near real time continuous disaster recovery, Journaling and the ability to replicate from...Continue Reading
Powered by IT Central Station
As promised, this is the next instalment in my Veeam posts, specifically on Remote Backup (backup to a remote site across the WAN). This has...Continue Reading
Veem gives ease of mind in regards to virtual backup & has given us the opportunity to test the backup.Powered by IT Central Station
Use Of Solution: For about 2 years. Valuable Features: The backup and instant recovery features are the most valuable to me. Improvements...Continue Reading
Manage Data Security and Cloud Computing
Learn to apply best practices and optimize your operations.
Expert Joe Granneman explains how to protect corporate data after leaks divulge information on NSA Bullrun and other government surveillance programs. Continue Reading
Expert Joe Granneman explains whether encryption key management in the cloud is still possible after a slew of revelations around the NSA. Continue Reading
A Fortinet survey shows that a majority of young users will violate IT security policies governing BYOD and cloud services to boost productivity. Continue Reading
Problem Solve Data Security and Cloud Computing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments. Continue Reading
Cloud-based storage introduces a number of risks, but banning these services outright is unlikely to generate the desired results. Continue Reading
Part of the draw of containerized data centers is ease and speed of deployment, but these features also pose security risks. Continue Reading