Essential Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Combat the latest cloud security challenges and risks

Enterprises continue to put cloud security strategies at the top of their to-do lists. Learn the latest cloud security risks and trends, as well as tips to secure your deployment.


Even though the benefits of cloud computing are clear to most enterprise IT teams, security remains a top make-or-break issue, often influencing organizations' decisions around cloud. A primary fear is losing control over IT infrastructure and applications, once they're in a public cloud provider's hands.

But security technologies are evolving, and enterprises have more access to cloud security tools that provide the control and visibility they crave. New environments, such as hybrid and multicloud, can create additional gaps and vulnerabilities, but tools, such as cloud access security brokers, now target those unique attack surfaces. By forming a comprehensive strategy, enterprises can take a proactive approach against cloud security challenges and risks.

1Uncover common cloud threats-

Understand top cloud security challenges

In the minds of many enterprises, cloud computing and security go hand in hand. While public cloud is a less expensive and more efficient computing environment, it can introduce new IT risks without some level of protection. Get to know the most pressing cloud security challenges and risks, such as shadow IT, compliance issues and improper encryption techniques. Consider all enterprise security needs and how to meet those requirements in every environment, including hybrid and multicloud.

Photo Story

Combat seven common cloud security risks

Cloud isn't free from risks, but most of them are preventable if you are prepared. Conquer these seven common security risks, ranging from a lack of encryption to poor API management. Continue Reading


Some cloud security concerns are more fiction than fact

Cloud security remains a top concern for enterprises, but some of those concerns lack validity. Find out if your data is really secure in the cloud and if cloud providers truly offer the best line of defense. Continue Reading


Wake up from these three cloud nightmares

Data breaches, compliance mistakes and shadow IT can create huge problems for enterprises. Cloud expert David Linthicum offers advice on how to prevent these stressful situations. Continue Reading


Avoid these emerging multicloud security issues

Enterprises adopt multicloud environments to gain greater availability, but often overlook some serious security issues. Find out where the vulnerabilities are before you broaden your cloud environment. Continue Reading


Shadow IT can wreak havoc in hybrid cloud

Shadow IT can compromise cloud when apps are linked via a hybrid workflow. Keep the agility of a hybrid cloud, without sacrificing security, with these three tips. Continue Reading

2Form a cloud security strategy-

What to consider when building a cloud security plan

After deciding to migrate to the cloud -- and getting the business on board -- reevaluate your IT strategy to address any cloud security challenges and risks. Start by researching cloud providers' capabilities to determine if their certifications and tools fit your security requirements. Don't assume your provider will handle all your security needs; sometimes, adding third-party tools is necessary to address vulnerabilities. Finally, when securing your cloud, remember there are internal cloud security threats as well as external. There is no one-size-fits-all security strategy, so be sure to craft your plan around the enterprise's individual needs.


Change the minds of cloud security doubters

Some enterprises are still not convinced that their data will be secure in the cloud. Win the cloud security argument in your organization with these tips. Continue Reading


Read between the lines of providers' cloud security assessments

When choosing a cloud provider, security is always on enterprises' minds. Evaluate a cloud provider's security assessments and certifications to confirm that data is fully protected -- but don't stop there. Continue Reading


Rethink your shadow IT strategy

Shadow IT is ever-present and building a plan to combat it can be tricky. Follow these four steps to form a solid shadow IT strategy. Continue Reading


Enterprises and providers need to share cloud security responsibilities

To ensure data security, cloud providers and enterprises need to work together. Take a closer look at the shared responsibility model to define the roles of accountability. Continue Reading


Evolve your zero trust security model for cloud

The cloud helps IT organizations scale their zero trust security policies, but can also introduce new challenges, such as reliance on services made available via cloud APIs. Continue Reading


Set up network security groups for public cloud

Add extra protection to cloud instances with network security groups, and evaluate what public cloud security options AWS, Azure and Google have to offer. Continue Reading


Double check your cloud API security

With cloud API's large attack surface, security in that area should be a top priority. Reduce risks with sessionless security and reporting. Continue Reading


Build an OpenStack security strategy

The OpenStack platform is still a work in progress, which can increase security risks. Tasks such as shortening the lifespan of OpenStack authentication certificates can help. Continue Reading

3Assess cloud security tools-

Build a wall around your cloud with security tools

Cloud is always evolving, which means cloud security technologies need to evolve alongside it. Hybrid and multicloud environments present new cloud security challenges and risks as data moves between on premises and the cloud. To address this vulnerable gap, cloud access security brokers (CASBs) focus on protecting that in-between area. Cloud security tools are also becoming more specialized, targeting certain areas such as data, through encryption, or user authorization, through IAM management. Explore provider and third-party tools to reduce cloud security threats.


Build a safe bridge between IT environments with CASBs

With the increased popularity of hybrid cloud, data that moves between on-premises and cloud is at risk. Cloud access security brokers step in to protect data when as it travels. Continue Reading


Weigh the pros and cons of implementing a CASB

Before you add cloud access security brokers to your toolchain, consider the possible negative effects, such as reduced productivity and shadow IT. Continue Reading


Choose and deploy CASBs wisely

Not all cloud access security brokers are created equal. Expert Stephen Bigelow offers guidance for adding extra security without sacrificing performance. Continue Reading


Single sign-on drives cloud IAM market growth

Enterprises are attracted to the convenience of single sign-on abilities, but the increased use of mobile devices has created more IAM security problems, as well as shadow IT and BYOD. Continue Reading


Explore options for cloud encryption technologies

Sometimes, encryption services from cloud providers don't deliver enough protection. Bulk up your cloud security with third-party vendors and centralized encryption. Continue Reading

4Test your cloud for weaknesses-

Climb into a hacker's mind with cloud security testing

One of the best ways to find cloud security is to attack like a hacker would. Testing your cloud is a critical part of a cloud security strategy. Not all environments have the same weak spots and there is no standard test that will discover all issues. In addition, don't assume that certain workloads don't need to tested, just because they're inaccessible from the internet. When it comes to cloud security challenges and risks, don't overlook internal threats. Testing your cloud is the only way to know where your cloud needs some extra security attention, whether external or internal.


Prevent attacks with a cloud penetration testing plan

Cloud threats can come from anywhere, even internally. Find vulnerabilities in a public cloud environment by creating a penetration testing plan. Continue Reading


Take control of public cloud with security testing

There is no standard security offering that will perfectly protect every cloud. Find weak spots and customize security by performing comprehensive tests with automated tools. Continue Reading


Find out if your cloud security model is robust enough

There are many steps to take when securing a cloud, including compliance processes and testing. Use this flow chart to see if your public cloud is secure enough. Continue Reading


Put your cloud security knowledge to the test

Major security breaches, including those at well-known retail giants, have enterprises doubting cloud's security. Take this quiz to see if you know how to keep your data safe in the cloud. Continue Reading

5Cloud security in the news-

Stay up to date on cloud security

Cloud security has been stealing tech headlines with data breaches, new technologies and improved compliance agreements. These stories reveal new cloud security challenges and risks, as well as the improvements being made to answer those concerns. Top cloud providers, such as Amazon Web Services, Azure and Google, continue to compete with each other to provide the best security services possible, with each new update bringing more protection to the cloud. Providers are also keeping a close eye on the transfer of personal data between the U.S. and Europe.


Safe Harbor agreement dissolves, but questions remain

The cloud community was not surprised by the dissolution of the Safe Harbor agreement, but concerns regarding data privacy are still present. Continue Reading


Privacy Shield does not quell all data privacy worries

With the adoption of Privacy Shield, Microsoft praises the clarity it provides. But while it is an improvement over the Safe Harbor agreement, there are still some grey areas to address. Continue Reading


Google steps up its game with cloud security

In an attempt to catch up to AWS and Azure, Google implements new cloud security certifications that may lure more enterprise customers. Continue Reading


Linode's quick security response may not be enough

Linode experienced multiple DDoS attacks during a password reset and, while its response was swift, the transparency of the situation may not be enough to give customers peace of mind. Continue Reading


Not all IT pros should have their own encryption key

Numerous vendors have added encryption capabilities as well as key management, but deciding who should hold the keys to the kingdom is still a concern. Continue Reading

6Cloud security terminology-

Learn important cloud security terms

To recognize and overcome cloud security challenges and risks, it's important to understand the vocabulary. No matter your knowledge level, here are some basic definitions you should know.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.