
Cloud Security
These are the most common cloud computing services
Cloud computing has established itself as a key element in the modern IT landscape. It offers a wide range of options for making companies' IT infrastructures more flexible, scalable and cost-efficient. Cloud computing is based on the principle that IT resources and services are provided and utilised via the internet instead of operating them locally on individual computers or servers within the company.
Deepen your knowledge
Do you always want to be up to date on the topic of cloud security? Are you looking for further presentations to deepen your expertise?
As an it-sa 365 user, you can take part in interactive live formats, look up past past activities and get in touch with IT security experts - all completely free of charge!
Register as an it-sa 365 user and get access to our extensive knowledge hub!
Cloud security - the biggest threats

Cloud systems offer enormous advantages in terms of flexibility and scalability, but also pose specific security challenges.
Philipp Kalweit, CEO of Kalweit ITS GmbH, is regarded as Germany's youngest professional hacker. With his company, he has specialised in penetration testing.
In this interview, the professional hacker explains which security gaps in cloud systems he regularly uncovers in penetration tests, how you can protect yourself against attacks on cloud systems and what you should look out for when switching to cloud services.
Please note: the presentation is in German. You can activate the English subtitles in the settings.
The challenges of cloud security
- Data control and data protection: The distribution of data across different cloud services makes monitoring and control difficult, which brings with it data protection issues.
- Identity and access management: It is challenging to ensure that only authorised users have access to cloud services, which requires robust authentication and access control systems.
- Management in hybrid and multi-cloud environments: Managing security across different cloud models and providers is often challenging.
- Endpoint security: Protecting the endpoints that access cloud services is critical to avoid vulnerabilities.
- Cyberthreats and advanced attacks: Cloud services are attractive targets for cybercriminals. This requires a high level of vigilance and advanced security measures.
- How can companies arm themselves against this? Find out more about the challenges and how you can prevent them here.
What cloud security solutions are available?
There are a variety of solutions in the world of cloud security, but three of the most important that are critical to most cloud environments include:
Good to know - what you should know about cloud security

You are not yet a registered user of it-sa 365?
The it-sa 365 platform is available to you as a digital HOME OF IT SECURITY all year round. As a registered participant, you can use the platform free of charge and have the opportunity to network with experts and enter into direct dialogue 365 days a year. You can participate in the IT Security Talks and other events & actions at it-sa 365 free of charge. We will also keep you up to date with news about our digital programme and the it-sa Expo&Congress on site in Nuremberg.
We look forward to you joining the it-sa 365 community!