close
The Wayback Machine - https://web.archive.org/web/20160304214648/http://www.cloudsecurityresource.com/
BERJAYA
BERJAYA
BERJAYA
CCSP

Latest Articles from Cloud Security

Posted: 3/3/2016

A famous leadership coach said, "Only Superman can leap tall buildings in a single bound, the rest of us must chip away at our goals one day at a time." What a befitting quote for the newly …

Posted: 3/3/2016

Securing the cloud must become a standard operating practice if companies hope to successfully deploy cloud strategies without opening themselves up to major threats and breaches. A new repo…

Posted: 3/2/2016

The adoption and growth of cloud has been impressive. A report published by Bessemer Venture Partners found the total market cap of 42 indexed public cloud companies will pass $500 billion b…

Posted: 3/1/2016

Collaboration is the name of the game for Intel Security lately, it seems.

Posted: 2/29/2016

As noted in previous postings on this year's RSA Convention in San Francisco, it comes at what many are calling a watershed moment in the history of cybersecurity. In fact, one needs to look…

Posted: 2/27/2016

Cloud Security news this week dove into report after report about the state of IT security from research organizations such as Security Current, Absolute Software, and Babit.

Featured Video from Cloud Security

Industry News from Cloud Security

Cloud Security Training

Straight from the Source

ArrowLearn More

FREE eNewsletter

Get the Latest Cloud Security News

ArrowSubscribe Now

Featured White Papers

The Rise of the Cloud Security Professional

The growing sophistication and prevalence of cloud technology is giving rise to a new type of IT specialist: the Certified Cloud Security Professional (CCSP)...

Closing the Skills Gap

How to Keep the Bad Guys (Hackers) Out and ensure your Organization is Protected...

Security Guidance for Early Adopters of the Internet of Things (IoT)

Mobile Working Group
The document was created using inputs from a number of security and mobility experts representing diverse industries....

Data-Centric Protection

By Diana Kelley
How Data-Centric Protection Increases Security in Cloud Computing and Virtualization...

View All Resources

Featured Courseware

Intro to Cloud Computing

By Chris Brenton
A thirteen minute video on the basics of cloud computing. This presentation covers cloud definitions and deployment models. Also discussed is the impact of cloud on network architecture and resource deployment...

Cloud Versus Virtualization

By Chris Brenton
This eight minute video defines virtualization and cloud computing. It discusses how the two technologies differ, as well as how they can be combined together to form a flexible architecture...

Virtualization Security

By Chris Brenton
This nineteen minute video takes a high level view at securing virtualized deployments. Architecture concerns are addressed. Also discussed is when virtualization may be more or less secure than a stand alone deployment model...

View All Resources

Featured Blog