New & Notable
Security in the Cloud: Cloud Computing Architecture News
December 11, 2018
As Kubernetes enters the enterprise mainstream, it has early adopters abuzz about security issues in the platform and the containers it orchestrates.
December 04, 2018
Enterprises that pay for Kubernetes support will respond differently to this week's critical security vulnerability than lean DevOps teams that use upstream distributions.
November 15, 2018
Container security tools, such as StackRox and Aqua Security, offer DevOps shops that want multi-cloud portability a centralized way to reduce the risk of complex infrastructures.
October 02, 2018
Kubernetes TLS bootstrap improvements in version 1.12 tackle container management complexity, and users hope there's more where that came from.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue Reading
The complexity of cloud computing requires a new approach to IT operations, and understanding the ins and outs of cloud ops is vital to maintaining secure cloud infrastructure. Continue Reading
Security plays a vital role in cloud operations. Test your knowledge of important concepts covered in Domain 5 of the CCSP exam, “Operations,” with this practice quiz. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google cloud security has been bolstered by new GCP tools and capabilities. Learn more about Google's improved cloud security features from expert Dave Shackleford. Continue Reading
Organizations have the necessary tools to protect data stored and processed in IaaS platforms. Learn why SaaS platform security remains a challenge from expert Rob Shapland. Continue Reading
Data privacy is always a top priority for enterprise IT teams. And those with a multi-cloud model should adopt a mix of security techniques -- from erasure coding to encryption. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
The NetSpectre vulnerability performs side-channel attacks to read data across networks. Learn how to use threat modeling to stop speculative execution from expert Ed Moyle. Continue Reading
Google Firebase's inadequate back-end development led to data leaks and vulnerabilities, including HospitalGown. Learn more about this security flaw from expert Michael Cobb. Continue Reading
Cloud services are major players in most companies now and can have a major impact on the management of access and identity governance. Learn how to handle IAM in the cloud era. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A REST API vulnerability in Salesforce's Marketing Cloud service put users at risk of data disclosure. Learn how to detect cloud API vulnerabilities from expert Rob Shapland. Continue Reading
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications. Continue Reading
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading