A ZDNet Multiplexer Blog What's this?

Protecting Your Clouds

Author Bios

Contributing Editor

Latest Stories

Protecting Your Clouds - Research Report

Protecting Your Clouds - Research Report

In this research report, we present the results of a recent Tech Pro Research survey, asking our readers about their current cloud activities, security operations, and priorities. You'll learn how IT departments are planning their implementation of private and hybrid cloud infrastructure, how they're dealing with concerns about insider threats, their perceptions of shadow IT, and how you can protect your organization in a challenging threat landscape.

3 days ago by in Protecting Your Clouds /

Cyberpedia: Let's Get to the Bottom of Cloud Security

Cyberpedia: Let's Get to the Bottom of Cloud Security

Navigating the glut of cloud security vendors and technologies can be a huge challenge and a massive headache. Palo Alto Networks' Cyberpedia site delivers relevant, up-to-date guidance that will increase your knowledge and help you make better-informed decisions when it comes to protecting your data and resources.

October 13, 2017 by in Protecting Your Clouds /

5 Misconceptions about Shadow IT

5 Misconceptions about Shadow IT

Shadow IT happens when individual teams and lines of business begin using cloud services without IT's involvement or oversight, and it's a risk that businesses cannot afford to take. Here, we discuss five common misconceptions and key considerations for any organization that does business in the cloud.

October 13, 2017 in Protecting Your Clouds /

Extending SaaS to Mobile Workers

Extending SaaS to Mobile Workers

When remote employees want to use SaaS applications on laptops, tablets and smartphones, the promise of increased productivity must be balanced against the increased risk. We'll talk about monitoring and controlling data access and storage, authentication, remote management, and other critical factors for SaaS endpoints.

October 4, 2017 by in Protecting Your Clouds

Restricting SaaS to Authorized Users

Restricting SaaS to Authorized Users

Once your company has decided to embrace SaaS, it's critical to lock down credentials and keep malicious actors from gaining access. We'll talk about monitoring user activity for insider threats, multifactor authentication, behavior analysis to catch anomalous activity, and other important considerations for safe SaaS deployments.

October 3, 2017 by in Protecting Your Clouds

State of Cloud Security Infographic

State of Cloud Security Infographic

This infographic illustrates several key findings from an exclusive survey conducted by CBS Interactive on behalf of Palo Alto Networks. Covering private and hybrid environments, infrastructure as a service, and software as a service, the data shows enterprises embracing cloud technologies despite serious concerns about data protection.

October 3, 2017 in Protecting Your Clouds

How to Assess Risk to Cloud-Based Data

How to Assess Risk to Cloud-Based Data

Software-as-a-service delivers significant benefits and advantages over traditional installations, but data security cannot be overlooked. Here, we discuss high-level policy considerations such as how to classify data based on its sensitivity, assign risk levels, and set access privileges based on those tiers.

October 3, 2017 by in Protecting Your Clouds

Best Of Protecting Your Clouds