Ask the Experts
Ask the Experts
-
What are the benefits of enterprise cloud bridge usage?
Is a cloud bridge right for your enterprise? Learn what a cloud bridge is and the benefits it can offer, as well as when you might consider using one in the workplace. Continue Reading
-
How do key aliases affect cloud encryption key management?
Amazon Web Services added support for key aliases to help improve enterprise cloud encryption key management. Learn what key aliases are and the benefits they bring to the enterprise. Continue Reading
-
What are the security concerns of backup as a service?
While backup as a service sounds like a great idea, there are several considerations to keep in mind prior to jumping in feet first. Expert Dan Sullivan explains. Continue Reading
-
Our AWS encryption keys were exposed accidentally -- now what?
Exposing encryption keys is never a good thing, but knowing the steps to take after such an incident can help limit damage to an enterprise. Expert Dan Sullivan explains. Continue Reading
-
Is the Certified Cloud Security Professional certification worth pursuing?
The Cloud Security Alliance and (ISC)2 recently introduced the Certified Cloud Security Professional certification, but is it a must-have? Expert Dan Sullivan explains. Continue Reading
-
How can AWS EC2 Container Service improve Docker security?
Expert Dan Sullivan outlines the security issues associated with Docker and explains how the AWS EC2 Container Service can help resolve them. Continue Reading
-
Why would public cloud providers turn off customer cloud accounts?
Public cloud providers reserve the right to shut off vulnerable cloud accounts, but how does it work? Expert Dan Sullivan explains. Continue Reading
-
Are PaaS database applications more secure than IaaS applications?
Choosing between a platform as a service database and an infrastructure as a service database when it comes to large amounts of data can be challenging. Expert Dan Sullivan explains the security factors to keep in mind. Continue Reading
-
What can enterprises learn from the new EU cloud security framework?
Expert Dan Sullivan outlines key takeaways enterprises should learn from the European Union's cloud security framework recommendations. Continue Reading
-
How does a cloud readiness assessment work?
Expert Dan Sullivan explains the three main factors of a cloud readiness assessment and how it can help enterprises prepare for a cloud migration. Continue Reading
-
Is a hybrid DDoS defense strategy the best option for enterprises?
Choosing between on-premises and cloud DDoS services can be challenging, so why not use both? Expert Dan Sullivan explains. Continue Reading
-
Cloud authentication: What's the best way to secure cloud credentials?
Cloud credentials can create major vulnerabilities. Expert Dan Sullivan outlines how to detect compromised credentials and the best ways to prevent it. Continue Reading
-
What are the benefits of a 'bring your own key' encryption service?
'Bring your own key' services let customers hold onto their encryption keys, but is it really more secure? Expert Dan Sullivan explains. Continue Reading
-
How does ISO/IEC 27018 affect cloud provider selection, PII privacy?
Learn what the ISO/IEC 27018 standard is, what it means to PII privacy, and how it should affect cloud provider and product selection. Continue Reading
-
Is the Google Cloud Security Scanner enterprise grade?
Learn how cloud security scanners compare to traditional vulnerability scanners and whether the Google Cloud Security Scanner is ready for enterprise use. Continue Reading