New & Notable
Data Security and Cloud Computing News
May 30, 2014
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing.
February 24, 2014
At the 2014 CSA Summit, presidential cybersecurity advisor Richard Clarke said NSA monitoring efforts are negatively affecting U.S. cloud providers.
February 20, 2014
An NSA-shaped cloud has hovered over the 2014 RSA Conference for months, but the show's agenda and expected attendance belie dark projections.
January 31, 2014
An attorney says the rumored suspension of Safe Harbor is unlikely, but either way, data privacy compliance will get harder for U.S. companies.
Data Security and Cloud Computing Get Started
Bring yourself up to speed with our introductory content
Organizations need to implement a wide range of cloud security controls to address a shifting sphere of influence, expert Ravila Helen White explains. Continue Reading
Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form. Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without ... Continue Reading
Evaluate Data Security and Cloud Computing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
See which vendors' offerings our readers voted to be the best cloud security products of the year in our 2013 Readers' Choice Awards. Continue Reading
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process. Continue Reading
This issue of Information Security looks at what enterprises need to do before moving to the cloud. Continue Reading
Manage Data Security and Cloud Computing
Learn to apply best practices and optimize your operations.
Expert Joe Granneman explains how to protect corporate data after leaks divulge information on NSA Bullrun and other government surveillance programs. Continue Reading
Expert Joe Granneman explains whether encryption key management in the cloud is still possible after a slew of revelations around the NSA. Continue Reading
A Fortinet survey shows that a majority of young users will violate IT security policies governing BYOD and cloud services to boost productivity. Continue Reading
Problem Solve Data Security and Cloud Computing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cloud-based storage introduces a number of risks, but banning these services outright is unlikely to generate the desired results. Continue Reading
Part of the draw of containerized data centers is ease and speed of deployment, but these features also pose security risks. Continue Reading
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual. Continue Reading