Ask the Experts
Ask the Experts
-
Container security: Is CoreOS Rocket better than Docker?
Expert Dan Sullivan takes a look at how CoreOS Rocket and Docker differ security-wise, and how to decide which to deploy in your enterprise. Continue Reading
-
Can AWS security features help HealthCare.gov security?
Moving HealthCare.gov onto AWS helped the government improve the safety of the site. Expert Dan Sullivan explains which AWS security features were most beneficial. Continue Reading
-
How can we mitigate the risks of cloud database services?
Before utilizing cloud database services, there are several security considerations to keep in mind and prepare for. Expert Dan Sullivan explains. Continue Reading
-
Cloud access security brokers: How should enterprises evaluate them?
A proper evaluation of a cloud access security broker is critical to finding the best match for your enterprise's needs. Expert Dan Sullivan outlines key criteria to keep in mind during CASB assessment. Continue Reading
-
What security considerations should go into choosing an AWS database?
Careful consideration must go into choosing the right AWS database for your enterprise. Expert Dan Sullivan discusses the options and security considerations to keep in mind during evaluation. Continue Reading
-
What are the benefits of enterprise cloud bridge usage?
Is a cloud bridge right for your enterprise? Learn what a cloud bridge is and the benefits it can offer, as well as when you might consider using one in the workplace. Continue Reading
-
How do key aliases affect cloud encryption key management?
Amazon Web Services added support for key aliases to help improve enterprise cloud encryption key management. Learn what key aliases are and the benefits they bring to the enterprise. Continue Reading
-
What are the security concerns of backup as a service?
While backup as a service sounds like a great idea, there are several considerations to keep in mind prior to jumping in feet first. Expert Dan Sullivan explains. Continue Reading
-
Our AWS encryption keys were exposed accidentally -- now what?
Exposing encryption keys is never a good thing, but knowing the steps to take after such an incident can help limit damage to an enterprise. Expert Dan Sullivan explains. Continue Reading
-
Is the Certified Cloud Security Professional certification worth pursuing?
The Cloud Security Alliance and (ISC)2 recently introduced the Certified Cloud Security Professional certification, but is it a must-have? Expert Dan Sullivan explains. Continue Reading
-
How can AWS EC2 Container Service improve Docker security?
Expert Dan Sullivan outlines the security issues associated with Docker and explains how the AWS EC2 Container Service can help resolve them. Continue Reading
-
Why would public cloud providers turn off customer cloud accounts?
Public cloud providers reserve the right to shut off vulnerable cloud accounts, but how does it work? Expert Dan Sullivan explains. Continue Reading
-
Are PaaS database applications more secure than IaaS applications?
Choosing between a platform as a service database and an infrastructure as a service database when it comes to large amounts of data can be challenging. Expert Dan Sullivan explains the security factors to keep in mind. Continue Reading
-
What can enterprises learn from the new EU cloud security framework?
Expert Dan Sullivan outlines key takeaways enterprises should learn from the European Union's cloud security framework recommendations. Continue Reading
-
How does a cloud readiness assessment work?
Expert Dan Sullivan explains the three main factors of a cloud readiness assessment and how it can help enterprises prepare for a cloud migration. Continue Reading