Journal articles on the topic 'Cloud Security Posture Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cloud Security Posture Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Journal, of Global Research in Electronics and Communications. "Cloud Security Posture Management: Tools and Techniques." Journal of Global Research in Electronics and Communications 1, no. 4 (2025): 1–6. https://doi.org/10.5281/zenodo.15115056.
Full textSingh, Ashish Kumar. "Cloud Security Posture Management in Server-less Environment." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1248–53. https://doi.org/10.22214/ijraset.2025.72290.
Full textG Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.
Full textRahman, Anisur, Md Ashrafuzzaman, Md Majadul Islam Jim, and Rebeka Sultana. "CLOUD SECURITY POSTURE MANAGEMENT AUTOMATING RISK IDENTIFICATION AND RESPONSE IN CLOUD INFRASTRUCTURES." ACADEMIC JOURNAL ON SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS EDUCATION 4, no. 3 (2024): 151–62. http://dx.doi.org/10.69593/ajsteme.v4i03.103.
Full textSantosh Datta Bompally. "Comprehensive approach to cloud security posture management: From infrastructure as code to AI-driven monitoring." Open Access Research Journal of Engineering and Technology 8, no. 2 (2025): 081–87. https://doi.org/10.53022/oarjet.2025.8.2.0046.
Full textSrinivas Reddy Cheruku. "AI-Driven Security Posture Management: A Revolutionary Approach to Multi-Cloud Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 497–509. https://doi.org/10.32628/cseit25111237.
Full textVeeraballi, Vishnuvardhana Reddy. "UNDERSTANDING CLOUD SECURITY POSTURE MANAGEMENT (CSPM): A COMPREHENSIVE GUIDE." INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY 8, no. 1 (2025): 3168–79. https://doi.org/10.34218/ijrcait_08_01_228.
Full textGoyal, Bhaskar. "Augmented Intelligence for Cloud Architects: AI-Powered Tools for Design and Management." European Journal of Computer Science and Information Technology 13, no. 6 (2025): 54–62. https://doi.org/10.37745/ejcsit.2013/vol13n65462.
Full textXing, Jingyu, and Zheng Zhang. "Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments." Security and Communication Networks 2022 (March 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/6783223.
Full textResearcher. "EVALUATING THE EFFECTIVENESS OF CSPM TOOLS IN MULTI-CLOUD ENVIRONMENTS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 2074–85. https://doi.org/10.5281/zenodo.14333702.
Full textZhang, Qianfeng, Lun Wang, and Daoming Li. "Managing Network Security in Cloud Computing: Analyzing Vulnerabilities and Implementing Effective Defense Strategies." Journal of Economic Theory and Business Management 1, no. 4 (2024): 18–27. https://doi.org/10.5281/zenodo.13232751.
Full textMuralidhara, Pavan, and Vaishnavi Janardhan. "Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments." International Journal of Scientific Research and Management (IJSRM) 4, no. 9 (2016): 4636–64. https://doi.org/10.18535/ijsrm/v4i9.22.
Full textShriwas, Rakhi, Rahul Kumar Sen, Vishnu Agrawal, Jitendra Singh Chouhan, and Saurbh Tege. "UPGRADING CYBERSECURITY: INVESTIGATING THE SECURITY BENEFITS OF CLOUD COMPUTING." International Journal of Technical Research & Science 9, Spl (2024): 27–35. http://dx.doi.org/10.30780/specialissue-iset-2024/051.
Full textIgwenagu, Udochukwu ThankGod Ikechukwu, Abidemi Ayodotun Salami, Abayomi Shamsudeen Arigbabu, Cassandra Esambe Mesode, Tunbosun Oyewale Oladoyinbo, and Oluwaseun Oladeji Olaniyi. "Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing." Journal of Engineering Research and Reports 26, no. 6 (2024): 60–75. http://dx.doi.org/10.9734/jerr/2024/v26i61162.
Full textBapi, Raju Ipperla, and Waghela Digvijay. "Architecting Secure Big Data Environments: Risk Management Strategies for Hadoop, Spark, and Cloud Deployments." Sarcouncil Journal of Applied Sciences 5, no. 2 (2025): 1–9. https://doi.org/10.5281/zenodo.15053574.
Full textSai Teja Battula. "A Comprehensive Framework for Evaluating the Scalability and Security of Fintech Web Applications in a Cloud-Native Environment." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1940–50. https://doi.org/10.32628/cseit23112567.
Full textNikhil Tej Gandhi. "CSPM for Healthcare: Securing Electronic Health Records (EHR) and Ensuring HIPAA Compliance." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1297–305. https://doi.org/10.32628/cseit241061174.
Full textMamidi, Sundeep Reddy. "Dynamic Security Policies for Cloud Infrastructures: An AI-Based Framework." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 1, no. 1 (2024): 200–211. http://dx.doi.org/10.60087/jaigs.v1i1.159.
Full textKrupal Gangapatnam. "Proactive Security with AI: Revolutionizing Cloud Infrastructure Protection." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 277–84. https://doi.org/10.32996/jcsts.2025.7.3.31.
Full textRehana Sultana Khan. "The evolution of AI-assisted cloud management: transforming enterprise infrastructure." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 248–59. https://doi.org/10.30574/wjaets.2025.15.2.0490.
Full textRehana Sultana Khan. "Security challenges and mitigation strategies in multi-cloud environments: A comprehensive analysis." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3725–31. https://doi.org/10.30574/wjarr.2025.26.1.1502.
Full textAbbagalla, Sindhooja, and Srividhya Gavini. "SMART SECURITY SOLUTIONS FOR CLOUD INFRASTRUCTURE USING MACHINE LEARNING." International Journal of Interpreting Enigma Engineers 01, no. 02 (2024): 08–14. http://dx.doi.org/10.62674/ijiee.2024.v1i02.002.
Full textAdebola Folorunso, Viqaruddin Mohammed, Ifeoluwa Wada, and Bunmi Samuel. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. http://dx.doi.org/10.30574/wjarr.2024.24.1.3169.
Full textVora, Vaibhav Anil. "Transforming Telecommunications and Finance: The Role of Cloud Identity Management." European Journal of Computer Science and Information Technology 13, no. 15 (2025): 70–83. https://doi.org/10.37745/ejcsit.2013/vol13n157083.
Full textSandhya, Guduru. "Cloud Security Automation: Enforcing CIS Benchmarks with AWS Config, Azure Policy, and OpenStack Chef Cookbooks." Journal of Scientific and Engineering Research 7, no. 10 (2020): 243–48. https://doi.org/10.5281/zenodo.15234591.
Full textOwobu, Wilfred Oseremen, Olumese Anthony Abieba, Peter Gbenle, et al. "Conceptual Framework for Deploying Data Loss Prevention and Cloud Access Controls in Multi-Layered Security Environments." International Journal of Multidisciplinary Research and Growth Evaluation 3, no. 1 (2022): 850–60. https://doi.org/10.54660/.ijmrge.2022.3.1.850-860.
Full textRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.
Full textKiran Kumar Suram. "Innovations in Infrastructure Automation: Advancing IAM in Cloud Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 255–63. https://doi.org/10.32628/cseit25111223.
Full textAdebola, Folorunso, Mohammed Viqaruddin, Wada Ifeoluwa, and Samuel Bunmi. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. https://doi.org/10.5281/zenodo.15063305.
Full textSalama, Ramiz, and Fadi Al-Turjman. "Addressing Cybersecurity Vulnerabilities with Cloud Security." NEU Journal for Artificial Intelligence and Internet of Things 4, no. 1 (2025): 86–95. https://doi.org/10.32955/neuaiit202541965.
Full textDagar, Ritu, Dr Shilpa Mahajan, and Dr Rohit Vashisht. "Enhancing Data Security in Cloud Computing Using Blockchain." Irish Interdisciplinary Journal of Science & Research 08, no. 01 (2024): 66–79. http://dx.doi.org/10.46759/iijsr.2024.8107.
Full textRathore, Anupam. "A Security Assessment Framework Based on Cloud Technology: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 6 (2024): 1955–59. http://dx.doi.org/10.22214/ijraset.2024.63424.
Full textVats, Rahul. "Zero Trust Security Models for CloudBased Enterprise Applications." International Journal of Advances in Engineering and Management 7, no. 4 (2025): 147–66. https://doi.org/10.35629/5252-0704147166.
Full textArif, Tuba, Byunghyun Jo, and Jong Hyuk Park. "A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats." Sensors 25, no. 8 (2025): 2350. https://doi.org/10.3390/s25082350.
Full textKaleru, Anjan Kumar. "Identity Governance: Essential Strategies and Best Practices for Cloud Environments." European Journal of Computer Science and Information Technology 13, no. 13 (2025): 14–22. https://doi.org/10.37745/ejcsit.2013/vol13n131422.
Full textSwapna Reddy Anugu. "AI in Financial Services: Revolutionizing Fraud Detection and Risk Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 208–17. https://doi.org/10.32628/cseit25112354.
Full textRAJESH RAJAMOHANAN NAIR. "The role of encryption key management in hybrid cloud environments." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 1235–43. https://doi.org/10.30574/wjaets.2025.15.2.0645.
Full textNaga Swetha Kattula. "Next-Gen Cloud: The future of secure and seamless cross-platform integrations." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1302–8. https://doi.org/10.30574/wjarr.2025.26.1.1090.
Full textAnjan Kumar Kaleru. "Converged IAM: Transforming Enterprise Identity Management in the Cloud Era." Journal of Computer Science and Technology Studies 7, no. 2 (2025): 598–603. https://doi.org/10.32996/jcsts.2025.7.2.64.
Full textSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Revolutionizing data center security: Conceptualizing a unified security framework for hybrid and multi-cloud data centers." Open Access Research Journal of Science and Technology 5, no. 2 (2022): 086–76. https://doi.org/10.53022/oarjst.2022.5.2.0065.
Full textJain, Prerna, Neha Thakre, Shakshi Barman, and Mansi Yadav. "Proactive Security Measures in Cloud Computing: Enhancing Data Protection and Trust." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 07 (2023): 9930–35. http://dx.doi.org/10.15680/ijircce.2024.1207105.
Full textAlugoju, Narasimha Rao. "Data Protection in the Cloud: Ensuring Security and Compliance for Organizational Data." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 1590–96. https://doi.org/10.22214/ijraset.2024.66087.
Full textMatseniuk, Y., and A. Partyka. "THE CONCEPT OF AUTOMATED COMPLIANCE VERIFICATION AS THE FOUNDATION OF A FUNDAMENTAL CLOUD SECURITY MODEL." Computer systems and network 6, no. 1 (2024): 108–23. http://dx.doi.org/10.23939/csn2024.01.108.
Full textSrikanth Dandolu. "Infrastructure as Code for Cloud-Native Data Platforms: Automation and Best Practices." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 451–88. https://doi.org/10.32996/jcsts.2025.7.5.55.
Full textSreenivasa, Rao Sola. "Security Roles and Privileges in Oracle Cloud ERP: Key Strategies for Secure Access Management." International Journal of Leading Research Publication 3, no. 7 (2022): 1–18. https://doi.org/10.5281/zenodo.15259078.
Full textIsmail, Assoujaa, and Ezzouak Siham. "Enhancing Cloud Security: Strategies and Technologies for Protecting Data in Cloud Environments." International Journal of Applied Mathematics, Computational Science and Systems Engineering 6 (November 19, 2024): 224–29. http://dx.doi.org/10.37394/232026.2024.6.18.
Full textVivek Aby Pothen. "AI-Powered Access Governance: Automating Risk-Based Identity in Enterprise Cloud." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 416–25. https://doi.org/10.32996/jcsts.2025.7.3.48.
Full textArun Kumar Akuthota. "Identity and access governance in the cloud: Leveraging SAP BTP, AI, and IAM." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 918–26. https://doi.org/10.30574/wjarr.2025.26.1.1088.
Full textShravan Kumar Amjala. "AI-Powered Cloud Automation: A Scholarly Perspective." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2664–72. https://doi.org/10.30574/wjaets.2025.15.2.0845.
Full textSingha, Anjani Kumar, Shakti Kundu, Harsh Pratap Singh, Lokendra Singh Songare, and Pradeep Kumar Tiwari. "Measuring network security in the cloud : A roadmap for proactive defense." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 889–902. http://dx.doi.org/10.47974/jdmsc-1964.
Full text