MUO

Cloud Security

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

Screen of a tool used for SIEM
What Is SIEM and How Can You Use It to Optimize Your Security?

Keeping track of security threats and flaws is difficult. That's why you need Security Information and Event Management.

By 
Cloud with key illustrating BYOK
What Is Bring Your Own Key, and Why Is It Important?

Worried about how data is kept in the cloud? Encryption is vital, but still has its issues. That's where BYOK comes in.

By 
IP whitelisting article cover image
Securing Golang Web Applications Using IP Whitelisting

Make use of Go’s Gin framework to secure your web apps with IP whitelisting.

By 
Woman surprised on computer
What Is Application Security and Why Do You Need It?

Application security can secure your data and protect it from external threats like hackers.

By 
The cloud is sitting on a blue motherboard
Is Data Stored in the Cloud Secure?

While no security system is fool-proof, thanks to encryption, redundancy, and 24/7 monitoring, your data should stay on the safe side of the cloud.

By 
Apple iCloud logo on top of Apple devices
Why Apple Abandoned Its Plan to Scan Your iCloud Photos

Privacy wins yet again as Apple users no longer need to worry about the company scanning their iCloud photo libraries.

By 
Padlock graphic illustration seen on dark blue background
What Is the Best Encryption Software?

Looking to render your files unreadable to hackers and other intruders? Here are the best services that encrypt your data.

By 
pcloud pass manager
Keep Your Passwords Safe, Secure, and Accessible With Pass From pCloud

pCloud Pass gives you instant secure access to your passwords across all of your devices.

By 
Black Woman on a Computer
What Is Hybrid Cloud Security and Why Might You Use It?

Why settle for a public or a private cloud when you can have both? Doing so may even be the safer option.

By 
person being scammed by criminal via laptop
What Is Consent Phishing and Why Is It Dangerous?

Through this smart phishing scam, cybercriminals gain access to data found on cloud storage apps. So how does consent phishing work?

By 
laptop with cloud upload symbol on screen
How to Become a Cloud Engineer: The Ultimate Guide

Are you interested in the role of a cloud engineer and want to become one? Here's everything you need to know.

By 
Image depicting servers in a cloud background.
How Russian Hackers Use Google Drive and Dropbox to Evade Detection

Learn how threat actors exploit legitimate cloud services and what you can do about it.

By 
what are encrypted messaging apps
The 8 Best End-to-End Encrypted Cloud Storage Providers

Looking for a cloud storage service/ Make sure your data is secure with a provider that encrypts all your private information.

By 
Fire flames on black background.
What Is a Next-Generation Firewall (NGFW)?

An NGFW is part of the third generation of firewalls, so what do they actually do? Do they only serve to protect the cloud?

By 
Lady Holding Tab
What Is Security Service Edge (SSE) and Why Is It Important?

This emerging concept aims to help organizations manage cloud work and data storage. Here's everything you need to know.

By 
apple icloud logo on brick wall
What Is a Secure Web Gateway (SWG) for the Cloud?

Learn the importance of a secure web gateway for the cloud environment.

By 
immunify360
What Is Imunify360? How Does It Enhance Website Security?

Learn all about Imunify360 and see if this security suite is worth your hard-earned money.

By 
A hacker accessing a cloud service
What Is Firewall as a Service (FWaaS)? Do You Need It?

Unlike traditional firewalls, FWaaS operates in the cloud and requires minimal maintenance. Learn all about it here.

By 
laptop with cloud upload symbol on screen
How Safe Are Cloud Applications?

Your favorite cloud applications may not be as secure as you'd think. Learn what you can do about it.

By 
Microsoft office suite
How Does Azure Protect Microsoft Office 365?

Microsoft Azure expands the security capabilities of Office 365 with its robust feature set. Learn all about it here.

By 
See more articles +