Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary?
The traditional mission of security is evolving under the influence of several key trends regarding the functions, staffing, processes and core capabilities of the security operations center.
Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.
IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
The intensifying of cloud compliance requirements has become a major hindrance to financial institutions' growth and innovation.
Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program
Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.
Given the sensitivity of data and the rising volume of cyberattacks across the globe, government agencies have deep concerns about cloud security.
Cloud security must be a team effort between providers and customers. The distribution of responsibility depends on the cloud model.
Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.