You've requested...

Download this next:

Confidential computing and Zero Trust security innovations

Facing a growing threat landscape, many organizations are embracing zero trust security. To fully secure data from modern threat actors, extending zero trust from the cloud to endpoints with hardware-based technologies is crucial.

In this blog post, you’ll discover how Zscaler and Intel's partnership unites confidential computing with zero trust security, bolstering multi-cloud defenses. Read on to learn how you can enable hardware-rooted trust and mutual attestation of applications before they run, from cloud to endpoint.

These are also closely related to: "Security in the Cloud Planning Guide"

  • Securing your cloud migration

    While cloud migrations have grown in popularity, security risks can still threaten cloud workloads. A few of these risks include:

    • A widening attack surface
    • Exploitation of complex & interconnected hybrid environments
    • Limited visibility, inhibiting centralized management
    • More extensive compliance requirements
    • & more

    So, what should organizations do to ensure the security of their cloud migration?

    Read this e-book to find out.

  • Cloud security & IAM: Security essentials

    Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail.

    First, we’ll take a look at what cloud security frameworks are and how they improve security posture. Then, we’ll cover 10 IAM tools that are built to keep your network secure.

Find more content like what you just read:

  • Confidential computing: Securing Kubernetes containers

    Cloud computing's rise has heightened security risks for sensitive workloads on third-party infrastructure. Confidential computing offers a solution with runtime encryption and isolation for Kubernetes containers, safeguarding against internal and external threats. Tune into this podcast to learn how you can enable advanced Kubernetes security.

    Download

  • How to overcome the hybrid cloud security hurdle

    Find out why businesses see hybrid cloud as the path to success in this white paper, and discover how leading organizations are realizing the full benefits of a hybrid IT strategy without compromising security.

    Download

  • Trustwave as an MCSS provider: Strengths & challenges

    To secure their workloads, many businesses are turning to managed cloud security services (MCSS) providers. The popularity of such services led IDC to analyze the market for MCSS. Dig into this report for a breakdown of one of the 18 providers evaluated: Trustwave.

    Download

  • Cloud: A security risk and opportunity

    With businesses around the world adopting cloud-based services at an ever-increasing pace, security is now more important than ever. We look at why European cloud adopters are dissatisfied with their cloud providers' security and how providers are focusing on security in the design phase of products and introducing new security mechanisms.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • Cloud Security 101: Best Practices & Self-Assessment

    This e-guide walks you through security best practices in the age of cloud. Also inside, put your security knowledge to the test with two cloud security quizzes from our experts.

    Download

  • The Buyer’s Guide to Complete Cloud Security

    Conventional approaches to security can’t deliver the granular visibility and control needed to manage cloud risk, particularly risk associated with containers. This buyer’s guide captures the definitive criteria for choosing the right cloud-native application protection platform (CNAPP) and partner.

    Download

  • CASB, CSPM, CWPP Emerge as Future of Cloud Security

    In this eguide, learn about the emergence and the future of Cloud security tools that will help bring successful and securely protected cloud environments.

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • Your pocket e-guide to cloud security

    As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.

    Download

  • Cloud native security: Best practices, tools & technologies

    As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.

    Download

  • What the future holds for cloud management in APAC

    In this e-guide, we dish out useful tips from APAC organisations that have successfully migrated to the cloud, the thinking behind their approaches to cloud migration and what they are doing to not only keep the lights on, but also raise their game in areas such as cloud data management and cloud security.

    Download

  • How to improve your cloud DLP

    This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.

    Download

  • Focus: Securing the cloud

    While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.

    Download

  • Enfrentando de frente as questões de desempenho dos microserviços

    With the number of enterprise cloud deployments growing by the day, having someone well versed in cloud security is crucial. Many professionals seeking a career in cloud security will turn to certifications to advance their learning. Here are some of the best cloud security certifications to consider in 2022.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Best cloud security certifications

    Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove their knowledge to potential employers. Are you trying to figure out which certifications will most advance your knowledge and career? Download this infographic to get the lowdown on the best cloud security certifications.

    Download

  • Cloud Security 101: Best Practices & Self-Assessment

    In this eguide, review best security practices in the age of cloud, and read through two cloud security quizzes from industry experts.

    Download

  • Multi-Cloud: A Blessing or Curse? What Security Teams Need to Keep in Mind

    In this eguide, read through a glossary of terms related to multi-cloud security, discover the risks of single vs multi-cloud security, and gain insight into different multi-cloud security strategies.

    Download

  • Multicloud challenges: From security to provisioning

    In this expert-guide, explore how the growth of the multicloud has impacted networking strategies from security to provisioning. Then, read on to learn how a cloud management platform can help you solve these challenges, as well as what capabilities it must have to be effective.

    Download

  • CW APAC, December 2021: Expert guide to cloud migration

    In this handbook, Computer Weekly looks at the key considerations and strategies that enterprises can take when moving their workloads to public cloud

    Download

  • The case for automating hybrid cloud management platforms

    Hybrid cloud has been garnering a lot of attention lately. However, like any burgeoning technology, it still has several significant challenges. Dive into the challenges facing hybrid cloud and how automating cloud management can help.

    Download

  • Palo Alto vs. CrowdStrike vs. Microsoft: Cloud security match-up

    Which vendors stack up and show strong performance in the cloud workload security (CWS) market? Read the following Forrester Wave report to find out, as their analysts compare the features and functionality of 13 top CWS providers, including Palo Alto, Microsoft, CrowdStrike, and Wiz.

    Download

  • How APAC is riding the cloud wave

    In this e-guide, find out why artificial intelligence is set to be the cloud's killer app, how Aussie firms are managing data in the cloud, and the Singapore government's move to develop its own cloud technology stack.

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • Check out hybrid cloud management tools from Google, Azure, AWS, and more

    Plenty of organizations are already using hybrid cloud strategies, but cloud management tools and strategies can oftentimes be more complex than they need to be. Open up this E-Book to explore hybrid cloud management tools from Google, AWS, Azure, and more.

    Download

  • Hybrid cloud migration strategies, explored

    Check out this E-Guide on hybrid cloud adoption to learn benefits and advantages of hybrid cloud, how to migrate effectively, how to simplify your migration strategy, and much more.

    Download

  • What does cloud computing look like in 2016?

    Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.

    Download

  • CW ANZ - December 2018: Rise to cloud and data management challenges

    In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.

    Download

  • CW APAC: Trend Watch: Cloud networking

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

    Download

  • Infographic: Top IT predictions in APAC in 2022

    As one of the first in the world to emerge from the throes of the pandemic, Asia-Pacific (APAC) organisations are expected to invest more in cyber security, cloud computing and automation in 2022 to secure their digital future. In this infographic, we review some of the key IT trends that are likely to shape the industry in the next months.

    Download

  • Data Analytics in Healthcare: Opportunities & Challenges

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

    Download

  • Cyber attackers exploiting poor cloud security

    More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene

    Download

  • Nordics focus: Moving to the cloud

    We focus on cloud computing take up in the Nordic region and feature articles that will help CIOs anywhere in the world on their cloud journeys.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • Benelux focus: Moving to the cloud

    We look at the evolution of cloud computing take up, with some examples from the Netherlands, then we analyse some of the challenges and opportunities cloud computing brings.

    Download

  • Royal Holloway: Cloud-native honeypot deployment

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

    Download

  • 8 key characteristics of cloud computing

    When it comes to building and deploying modern applications, companies rely on the cloud. From the ability to manage automation, costs, performance, compliance, and security, cloud provides flexibility that sets it apart from on-premises IT architectures. In this e-guide, explore the 8 key characteristics of cloud computing.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • Making the case for cloud-based security

    Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.

    Download

  • MicroScope – March-April 2024: Is cloud the best option?

    In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year

    Download

  • Getting Cloud Security Right

    In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.

    Download

  • CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres

    Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • Focus: Private cloud

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

    Download

  • CW APAC: Expert advice on hybrid cloud

    In this handbook on the adoption of hybrid cloud in Asia-Pacific, Computer Weekly looks at what's holding businesses back from making effective use of hybrid cloud.

    Download

  • Launching a cloud-based analytics campaign: The peaks and pitfalls

    In this expert e-guide, learn about some of the major issues facing modern analytics. Read about the initial struggle of launching an operational analytics program, and how integration with cloud solutions can help alleviate these pains. In addition, read about a travel-booking company's success story of BI cloud integration.

    Download

  • Hybrid Cloud workloads: The Essential Guide

    Debate continues to rage within the enterprise about the long-term benefits of adopting a hybrid cloud method of IT consumption. This Essential Guide shows everything the enterprise needs to know.

    Download

  • Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst

    In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.

    Download

  • A comparison of Azure, AWS, and Google cloud services

    AWS, Azure, and Google are all huge names in the cloud space, offering everything from big data in the cloud to serverless computing options and more. Read on for a vendor-neutral comparison of these three providers to determine which combination – if any – best fits your organization's infrastructure requirements.

    Download

  • Cloud migration: Choosing the right strategy and tools

    In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.

    Download

  • Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial

    In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.

    Download

  • Cloud Migration: How to do so safely and securely

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

    Download