Cloud Security | News, how-tos, features, reviews, and videos
The Relational Database Service from AWS can help streamline a host of cloud storage operations, but maintaining security requires some attention on the part of the user. Here are some best practices for using RDS.
Gone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks.
Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.
Use these settings in Microsoft Azure Active Directory to take control of user-requested OAuth access permissions.
Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.
Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies.
Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should.
Security requirements for cloud vendors are exhaustive, but their clients should still vet them extensively before moving forward
You can ensure cloud compliance with PCI DSS, HIPAA and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it.
The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another way: Do they really know where they're putting sensitive data?