The Ultimate Guide to Cloud Security
2025 edition
Overview
Those using cloud computing services of any kind generally do so with an expectation of reliability, dependability and security. Cloud security is the component of the cybersecurity industry concerned with securing these services from malware and ‘bad actors’. Cloud Security is an umbrella term and covers everything from policies, technologies, products, services, controls and procedures employed in the protection of cloud services, which can include applications, infrastructure, storage or any other combination of internet-accessible resources.
Analyst reports

KuppingerCole on Virtualisation
BeyondTrust recognised as leader in secrets management
3 days ago

Gartner on Hybrid Cloud
Red Hat & Oracle expand hybrid cloud capabilities on OC...
4 days ago

KuppingerCole on Hybrid Cloud
CyberArk named leader in secrets management by Kuppinge...
Last week

Gartner on Advanced Persistent Threat Protection
BlueVoyant launches tailored Microsoft Security optimis...
This month

Gartner on SaaS
Pulumi launches IDP to speed secure cloud infrastructur...
This month
Featured news

About DevOps
Exclusive: Shannon Murphy of Trend Micro on securing AI...
This month

About Software-as-a-Service
Exclusive: How Netskope built a high-growth culture acr...
Last month

About Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month

About Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Last month

About Collaboration
Exclusive: How Commvault strengthens APAC partner ecosy...
Last month

About Cloud Services
Exclusive: Why every day should be World Backup Day
Last month

About Collaboration
Exclusive: Tenable's growth driven by strategic moves a...
Mon, 17th Mar 2025

About Public Sector
Exclusive: CyberArk's Rahul Dubey discusses the future ...
Tue, 11th Mar 2025
Expert columns

By Guy Brown of Fastly
Defending the Cloud from the Edge
3 days ago

By Saeed Abbasi of Qualys
Six cybersecurity trends you can't afford to ignore in ...
Last month

By Dakshitaa Babu of SquareX
The right approach in controlling the Shadow SaaS spraw...
Last month

By Scott Hesford of BeyondTrust
Just-in-time access emerges as key to mitigating risk
Last month

By David Brown of FireMon
Harmony or havoc? The challenge of managing network sec...
Last month
Interviews

Discussing DevOps
Exclusive: Shannon Murphy of Trend Micro on securing AI...
This month

Discussing Software-as-a-Service
Exclusive: How Netskope built a high-growth culture acr...
Last month

Discussing Threat intelligence
Exclusive: Google Cloud Security VP on solving CISO pai...
Last month

Discussing Data Protection
Google Cloud unveils AI-powered Unified Security platfo...
Last month

Discussing Collaboration
Exclusive: How Commvault strengthens APAC partner ecosy...
Last month
More expert columns

By Dakshitaa Babu of SquareX
All organizations are vulnerable to browser ransomware....
Last month

By Chris Fisher of Vectra AI
Outpacing AI-Driven cyber attacks: Strategies for moder...
Last month

By Nick Marrett of Bruce Security Asia
Why independent MSSPs are vital for strong cyber defenc...
Last month

By Oscar Morales of Calian IT & Cyber Solutions
Cloud security in 2025: Why proactive defense is critic...
Last month

By Robin Long of Rapid7
Securing the cloud: Why cyber vigilance must keep pace ...
Fri, 28th Mar 2025

By Dakshitaa Babu of SquareX
Server-side scanners fail at detecting malicious pages:...
Thu, 27th Mar 2025
Top players
You can read more from the top players Innovation, Extend, Microsoft, Application Security, and Google Cloud.
Recent news

About Firewalls
Radware named leader for AI-driven API security by Giga...
2 days ago

About DevOps
Ekco acquires Predatech to boost UK cyber security serv...
3 days ago

About Cloud Services
Centrel unveils plug-and-play tool to simplify IT docum...
3 days ago

About Data Analytics
Tenable One platform adds connectors & custom risk dash...
3 days ago

About Malware
Organisations boost AI security as data threats & risks...
3 days ago
More news

About Scams
Hazy Hawk exploits abandoned cloud DNS for global scams...
3 days ago

About Firewalls
Exabeam & Vectra AI partner to boost threat detection s...
3 days ago

About Software-as-a-Service
SonicWall unveils cyber suite for MSPs with up to USD $...
3 days ago

About Cloud Services
AI-driven threats prompt IT leaders to rethink hybrid c...
3 days ago

About Data Protection
Synology unveils cloud surveillance service with easy d...
3 days ago
Even more news

About Firewalls
IP Fabric unveils upgrade to boost firewall visibility ...
3 days ago

About Software Updates
Cloudflare, Microsoft & police disrupt global malware s...
3 days ago

About Cloud Services
Rubrik & Rackspace launch managed cyber recovery for cl...
3 days ago

About Software-as-a-Service
Datadog unveils open-source AI models for better observ...
3 days ago

About Hybrid Cloud
Red Hat releases cloud-optimised Linux images for major...
4 days ago
Job moves

Move at VMware
Okta names Mike Reddie to lead Australia & New Zealand ...
Last week

Move at Pure Storage
Ekco appoints cloud industry veteran Ben Savage as CEO ...
Last week

Move at Netskope
Netskope expands in SAARC with leadership promotion & n...
This month

Move at BlackBerry
Gigamon appoints new Asia-Pacific leaders to drive clou...
This month

Move at Microsoft
Tenable appoints Eric Doerr as Chief Product Officer to...
This month
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Advanced Persistent Threat Protection, Breach Prevention, and Application Security.
Powered by