Academic literature on the topic 'Cloud Security Posture Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud Security Posture Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud Security Posture Management"
Journal, of Global Research in Electronics and Communications. "Cloud Security Posture Management: Tools and Techniques." Journal of Global Research in Electronics and Communications 1, no. 4 (2025): 1–6. https://doi.org/10.5281/zenodo.15115056.
Full textSingh, Ashish Kumar. "Cloud Security Posture Management in Server-less Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1248–53. https://doi.org/10.22214/ijraset.2025.72290.
Full textG Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.
Full textRahman, Anisur, Md Ashrafuzzaman, Md Majadul Islam Jim, and Rebeka Sultana. "CLOUD SECURITY POSTURE MANAGEMENT AUTOMATING RISK IDENTIFICATION AND RESPONSE IN CLOUD INFRASTRUCTURES." ACADEMIC JOURNAL ON SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS EDUCATION 4, no. 3 (2024): 151–62. http://dx.doi.org/10.69593/ajsteme.v4i03.103.
Full textSantosh Datta Bompally. "Comprehensive approach to cloud security posture management: From infrastructure as code to AI-driven monitoring." Open Access Research Journal of Engineering and Technology 8, no. 2 (2025): 081–87. https://doi.org/10.53022/oarjet.2025.8.2.0046.
Full textSrinivas Reddy Cheruku. "AI-Driven Security Posture Management: A Revolutionary Approach to Multi-Cloud Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 497–509. https://doi.org/10.32628/cseit25111237.
Full textVeeraballi, Vishnuvardhana Reddy. "UNDERSTANDING CLOUD SECURITY POSTURE MANAGEMENT (CSPM): A COMPREHENSIVE GUIDE." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 3168–79. https://doi.org/10.34218/ijrcait_08_01_228.
Full textGoyal, Bhaskar. "Augmented Intelligence for Cloud Architects: AI-Powered Tools for Design and Management." European Journal of Computer Science and Information Technology 13, no. 6 (2025): 54–62. https://doi.org/10.37745/ejcsit.2013/vol13n65462.
Full textXing, Jingyu, and Zheng Zhang. "Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments." Security and Communication Networks 2022 (March 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/6783223.
Full textResearcher. "EVALUATING THE EFFECTIVENESS OF CSPM TOOLS IN MULTI-CLOUD ENVIRONMENTS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 2074–85. https://doi.org/10.5281/zenodo.14333702.
Full textDissertations / Theses on the topic "Cloud Security Posture Management"
Parikh, Apoorva. "Cloud security and platform thinking : an analysis of Cisco Umbrella, a cloud-delivered enterprise security." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121796.
Full textPenjala, J. (Joni). "Information security management in cloud computing:a case study." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906052441.
Full textRunsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Full textØstdahl, Thomas. "Security Issues with Content Management Systems (CMSs) on the Cloud." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13813.
Full textYoung, Randall Frederick. "Defining the Information Security Posture: An Empirical Examination of Structure, Integration, and Managerial Effectiveness." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9006/.
Full textMahmoud, Suzan. "On Information Security Processes in Cloud Computing." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20462.
Full textKumar, Gunasekar, and Anirudh Chelikani. "Analysis of security issues in cloud based e-learning." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20868.
Full textYoung, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.
Full textKannan, Anand. "Performance evaluation of security mechanisms in Cloud Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99464.
Full textJhawar, R. "DEPENDABILITY IN CLOUD COMPUTING." Doctoral thesis, Università degli Studi di Milano, 2014. http://hdl.handle.net/2434/233330.
Full textBooks on the topic "Cloud Security Posture Management"
Abbadi, Imad M. Cloud Management and Security. John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118817087.
Full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textF, Ransome James, ed. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textLoske, André. IT Security Risk Management in the Context of Cloud Computing. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11340-7.
Full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, ed. Information technology reform: Progress made but future cloud computing efforts should be better planned : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, United States Senate. U.S. Govt. Accountability Office, 2012.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. Innovating with less: Examining efforts to reform information technology spending : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, May 24, 2012. U.S. G.P.O., 2012.
Find full textNomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. Packt Publishing, Limited, 2024.
Find full textNomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. de Gruyter GmbH, Walter, 2024.
Find full textBook chapters on the topic "Cloud Security Posture Management"
Xing, Tianyi, Zhengyang Xiong, Haiyang Qian, Deep Medhi, and Dijiang Huang. "Cloud Security." In Cloud Services, Networking, and Management. John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119042655.ch11.
Full textCampbell, Tony. "Cloud Computing Security." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_12.
Full textBiswal, Asutosh Kumar, Sourav Kanti Addya, Bibhudatta Sahoo, and Ashok Kumar Turuk. "Secured IoT Device Management in Cloud-Fog Environment using Blockchain." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-1.
Full textSehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. "Cloud Management and Monitoring." In Cloud Computing with Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24612-9_6.
Full textWare, Willis H. "The Cyber-Posture of the National Information Infrastructure." In Information Security Management & Small Systems Security. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35575-7_14.
Full textAlani, Mohammed M. "Cloud Security: A Security Management Perspective." In Strategic Engineering for Cloud Computing and Big Data Analytics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52491-7_10.
Full textSehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. "Cloud Management and Monitoring." In Cloud Computing with Security and Scalability. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07242-0_6.
Full textMishra, Pravin. "AWS Security and Management Services." In Cloud Computing with AWS. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9172-6_10.
Full textKamongi, Patrick. "Cloud Security and Privacy Management." In Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons Singapore Pte. Ltd, 2019. http://dx.doi.org/10.1002/9781119053385.ch5.
Full textSingh, Gurwinder, Munish Rattan, and Gurjot Kaur Walia. "Cloud Security Risk Management Quantifications." In Big Data, Cloud Computing and IoT. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003298335-9.
Full textConference papers on the topic "Cloud Security Posture Management"
Leaua, Melina Silvia, Alexandru Chiş, Titus-Constantin Bălan, and Lucian Florin Ilca. "Assesment of Cloud Security Posture Management Scenarios." In 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet). IEEE, 2024. http://dx.doi.org/10.1109/roedunet64292.2024.10722349.
Full textPinto, Breno Silva, Lucas Cioffi, and Felipe Espósito. "Third-party Cloud Risk Management." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679395.
Full textLoonkar, Shweta, Neeti Taneja, and N. Beemkumar. "Fuzzy Rule-Based Trust Management for Cloud Security." In 2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI). IEEE, 2024. https://doi.org/10.1109/icscai61790.2024.10867234.
Full textLi, Tianyu, Chaomeng Lu, and Bert Lagaisse. "A Multi-Dimensional Visual Analytics Tool for the Security Posture of Open-Source Software." In 2025 IEEE/ACM 3rd International Workshop on Software Vulnerability Management (SVM). IEEE, 2025. https://doi.org/10.1109/svm66695.2025.00007.
Full textSharma, Lalit, Adity Dokania, Akash Verma, Divyesh Pradeep Shah, Pratik Mayur Parekh, and Sachin Sudhir Shinde. "AI-Augmented Security Protocols for Scalable Cloud Infrastructure Management." In 2025 International Conference on Engineering, Technology & Management (ICETM). IEEE, 2025. https://doi.org/10.1109/icetm63734.2025.11051957.
Full textPaidy, Pavan, and Krishna Chaganti. "CLOUD-NATIVE SECURITY POSTURE MANAGEMENT IN AWS AND AZURE: AUDITDRIVEN APPROACHES TO RISK AND COMPLIANCE." In 12th International Conference on Signal Processing. Academy & Industry Research Collaboration, 2025. https://doi.org/10.5121/csit.2025.151106.
Full textBulut, Muhammed Fatih, and Jinho Hwang. "NL2Vul: Natural Language to Standard Vulnerability Score for Cloud Security Posture Management." In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021. http://dx.doi.org/10.1109/cloud53861.2021.00073.
Full textCoppola, Gregory, Aparna S. Varde, and Jiacheng Shang. "Enhancing Cloud Security Posture for Ubiquitous Data Access with a Cybersecurity Framework Based Management Tool." In 2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2023. http://dx.doi.org/10.1109/uemcon59035.2023.10316003.
Full textMaamari, Waleed A. Al, Muhammad R Ahmed, ,. Rusmawati Binti Said, and Mohammad H Marhaban. "Cybersecurity Incident Response Dynamics: Unveiling Emerging Trends and Confronting Persistent Challenges." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141104.
Full textShekhawat, Deependra, and Siddharth Saboo. "Fortifying the Energy Frontier: Overcoming Cybersecurity Challenges in the Oil and Gas Industry Through Resilient Strategies and Innovative Solutions." In ADIPEC. SPE, 2024. http://dx.doi.org/10.2118/222471-ms.
Full textReports on the topic "Cloud Security Posture Management"
de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textRose, Scott. Planning for a Zero Trust Architecture. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.cswp.20.
Full textSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.
Full textCoyner, Kelley, and Jason Bittner. Automated Vehicles and Infrastructure Enablers: Cybersecurity. SAE International, 2024. http://dx.doi.org/10.4271/epr2024018.
Full textLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Full textThe 5th National Global Change Conference; Transformative Futures for Water Security Seminar. Academy of Science of South Africa, 2023. http://dx.doi.org/10.17159/assaf.2023/90.
Full text