Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Private cloud sprawl: How cloud consolidation can improve security
Vast private cloud infrastructure can be detrimental to an organization. Expert Ed Moyle looks at how and when to consider cloud consolidation to reduce cloud creep. Continue Reading
AES-128 encryption key generation: Leave it to AWS or do it in-house?
Organizations can opt to allow Amazon Elastic Transcoder to generate AES-128 encryption keys or do the job in-house -- which is more secure? Expert Dan Sullivan explains. Continue Reading
Traditional vs. cloud pen testing: What's the difference?
Penetration testing in the cloud differs from on-premises testing. Expert Dan Sullivan discusses cloud pen testing and whether cloud providers or in-house security teams are best suited for the job. Continue Reading
-
What's the business case for Amazon's three AWS monitoring tools?
CloudTrail, CloudWatch and AWS Config are three different tools from Amazon that help enterprises monitor AWS. Expert Dan Sullivan explains the differences between the three and when each should be used. Continue Reading
AWS security groups vs. traditional firewalls: What's the difference?
AWS security groups provide network-based blocking mechanisms, much like traditional firewalls. Expert Dan Sullivan explains the differences between the two. Continue Reading
What are the security pros and cons of hybrid cloud storage?
Interest in hybrid cloud data storage is growing, but is it safe? Expert Dan Sullivan outlines the risks and rewards for enterprises.Continue Reading
How can cloud access security brokers improve enterprise security?
Cloud access security brokers can help enterprises enforce security policies in the cloud. Expert Dan Sullivan discusses the benefits.Continue Reading
Using NIST 800-125-A to understand hypervisor security threats
Expert Paul Henry discusses how the draft NIST Special Publication 800-125-A can help enterprises better understand the threat landscape in a virtual realm.Continue Reading
Can the Cloud Security Alliance help with comparing cloud providers?
The Cloud Security Alliance published its Privacy Level Agreement for Europe v2 to help consumers compare cloud providers. Expert Dan Sullivan explains how it can help U.S. companies as well.Continue Reading
Negotiating SLA requirements to ensure cloud regulatory compliance
Outlining your enterprise regulatory compliance reporting needs and establishing these needs with cloud providers during SLA negotiations is critical. Ed Moyle outlines steps to help organizations get started.Continue Reading
-
Can proprietary databases be securely migrated to the AWS cloud?
When enterprises look to migrate a proprietary database to the AWS cloud, there are a number of security considerations to keep in mind. Expert Dan Sullivan explains.Continue Reading
How AWS Key Management Service bolsters cloud security
The AWS Key Management Service is a good tool for cloud encryption key management. Expert Dave Shackleford examines AWS KMS and its benefits to enterprises.Continue Reading
How to use AWS to meet compliance standards' requirements
Looking to make compliance an easier task? Expert Steven Weil explains how to use AWS to help meet compliance standards' requirements.Continue Reading
Using a software-defined perimeter to create an air-gapped network
The Cloud Security Alliance's software-defined perimeter protocol can help enterprises achieve dynamic air-gapped networks. Expert Ed Moyle discusses how SDP works and the benefits it can provide.Continue Reading
How AWS PCI compliance affects enterprise PCI compliance
Before deploying an AWS infrastructure, it is critical to understand how it will affect enterprise PCI compliance. Expert Rob Shapland discusses key factors to consider.Continue Reading