New & Notable
Security in the Cloud: Cloud Computing Architecture News
January 02, 2019
DevOps security tools are on the market, and IT pros are acutely aware of the need to update their practices. But alignment with business teams hasn't gotten any easier.
December 11, 2018
As Kubernetes enters the enterprise mainstream, it has early adopters abuzz about security issues in the platform and the containers it orchestrates.
December 04, 2018
Enterprises that pay for Kubernetes support will respond differently to this week's critical security vulnerability than lean DevOps teams that use upstream distributions.
November 15, 2018
Container security tools, such as StackRox and Aqua Security, offer DevOps shops that want multi-cloud portability a centralized way to reduce the risk of complex infrastructures.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. Continue Reading
To learn the ins and outs of Google’s identity and access management service, start with the basic concepts of roles, permissions and policies. Continue Reading
The complexity of cloud computing requires a new approach to IT operations, and understanding the ins and outs of cloud ops is vital to maintaining secure cloud infrastructure. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Is proxy-based security in the cloud right for you? Expert Ed Moyle looks at the benefits and drawbacks of using proxies for Office 365 and other cloud platforms. Continue Reading
Google cloud security has been bolstered by new GCP tools and capabilities. Learn more about Google's improved cloud security features from expert Dave Shackleford. Continue Reading
Organizations have the necessary tools to protect data stored and processed in IaaS platforms. Learn why SaaS platform security remains a challenge from expert Rob Shapland. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
The NetSpectre vulnerability performs side-channel attacks to read data across networks. Learn how to use threat modeling to stop speculative execution from expert Ed Moyle. Continue Reading
Google Firebase's inadequate back-end development led to data leaks and vulnerabilities, including HospitalGown. Learn more about this security flaw from expert Michael Cobb. Continue Reading
Cloud services are major players in most companies now and can have a major impact on the management of access and identity governance. Learn how to handle IAM in the cloud era. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A REST API vulnerability in Salesforce's Marketing Cloud service put users at risk of data disclosure. Learn how to detect cloud API vulnerabilities from expert Rob Shapland. Continue Reading
Kamal Shah of Skyhigh Networks explains how his company is battling cloud console fatigue for enterprises and expanding its CASB model beyond cloud applications. Continue Reading
Researchers recently proved that it's possible to steal cloud data from a CPU cache. Expert Rob Shapland discusses how this works and what it means for multi-tenant cloud security. Continue Reading