New & Notable
Security in the Cloud: Cloud Computing Architecture News
October 14, 2020
HashiCorp revealed its first new open source project in five years this week: a cloud security framework for access control called Boundary.
September 14, 2020
Real-world DevSecOps centralizes IT security around the CI/CD pipeline but defines separate roles that each IT constituency plays in securing apps and infrastructure.
August 21, 2020
As Kubernetes matures, community maintainers weigh enterprise demand for secure upstream defaults against concerns about sprawl and customizability.
July 23, 2020
A new report by Check Point Software Technologies revealed attackers were abusing Google Cloud Functions to hide their phishing links within public cloud services.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity. Continue Reading
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. Continue Reading
The shared responsibility model defines cloud security, but it changes for IaaS, PaaS and SaaS. Get to know the ins and outs of cloud security and learn exactly what your company is responsible for. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Curious how to choose the right CASB deployment mode for your organization? Before you buy, compare how proxy vs. API CASB architectures work to secure SaaS applications. Continue Reading
Cloud management is the exercise of administrative control over public, private and hybrid clouds. Continue Reading
Get insights into the Certified Cloud Security Professional cert, cloud infrastructure and platform benefits and risks, and more from the author of a CCSP exam guide. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
Confidential computing is an emerging cloud technology, and the major cloud platforms have all addressed it with different strategies around usability and scale. Continue Reading
Firewall-as-a-service offerings implement security policies across consolidated traffic headed to all locations. Learn about four security features and benefits of FWaaS. Continue Reading
Following established best practices helps enterprises facilitate collaboration and communication through SaaS applications while simultaneously ensuing secure SaaS use. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cybersecurity hygiene in the enterprise must be a shared responsibility between employees and employers. Follow these steps to get the job done by both. Continue Reading
Cloud security readiness remains a shortcoming for companies despite the majority using cloud services. Here are three steps they can take to close the cloud security gap. Continue Reading
Protect your hybrid cloud environment against these five common security vulnerabilities. Avoid the risks with established strategies and public cloud tools. Continue Reading