New & Notable
Data Security and Cloud Computing News
May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
February 24, 2014
At the 2014 CSA Summit, presidential cybersecurity advisor Richard Clarke said NSA monitoring efforts are negatively affecting U.S. cloud providers.
February 20, 2014
An NSA-shaped cloud has hovered over the 2014 RSA Conference for months, but the show's agenda and expected attendance belie dark projections.
January 31, 2014
An attorney says the rumored suspension of Safe Harbor is unlikely, but either way, data privacy compliance will get harder for U.S. companies.
Data Security and Cloud Computing Get Started
Bring yourself up to speed with our introductory content
Organizations need to implement a wide range of cloud security controls to address a shifting sphere of influence, expert Ravila Helen White explains. Continue Reading
Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form. Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without ... Continue Reading
Evaluate Data Security and Cloud Computing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Big data offers horizontal scalability, but how do you get your database security to scale along with it? Continue Reading
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of loss and exposure. What technologies should be in place to enforce NoSQL security controls on-premises... Continue Reading
See which vendors' offerings our readers voted to be the best cloud security products of the year in our 2013 Readers' Choice Awards. Continue Reading
Manage Data Security and Cloud Computing
Learn to apply best practices and optimize your operations.
Expert Joe Granneman explains how to protect corporate data after leaks divulge information on NSA Bullrun and other government surveillance programs. Continue Reading
Expert Joe Granneman explains whether encryption key management in the cloud is still possible after a slew of revelations around the NSA. Continue Reading
A Fortinet survey shows that a majority of young users will violate IT security policies governing BYOD and cloud services to boost productivity. Continue Reading
Problem Solve Data Security and Cloud Computing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments. Continue Reading
Cloud-based storage introduces a number of risks, but banning these services outright is unlikely to generate the desired results. Continue Reading
Part of the draw of containerized data centers is ease and speed of deployment, but these features also pose security risks. Continue Reading