New & Notable
Security in the Cloud: Cloud Computing Architecture News
June 11, 2020
While analyzing the network dropper GuLoader, researchers found an almost identical commercial software tool called CloudEye offered by a legitimate-looking Italian company.
May 27, 2020
Between January and April amid the COVID-19 pandemic, McAfee found usage of cloud collaboration apps and attacks seeking to steal account credentials both skyrocketed.
April 16, 2020
Security risk was mostly an afterthought as businesses scrambled to support remote work in response to COVID-19, but SecOps is now at the top of IT shops' priority lists.
April 01, 2020
AWS has released Amazon Detective, a managed threat hunting service that generates visualizations out of log data from native Amazon Web Services.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions. Continue Reading
What sets web roles and worker roles apart in Microsoft's Azure Cloud Services? Here's a look at how they are different. Continue Reading
Secure Access Service Edge is the new approach to improving network performance in enterprises powered by cloud and mobile. Here's what you must know about SASE. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more. Continue Reading
A multi-cloud environment is not inherently more secure than a single cloud. Learn how to choose between single cloud vs. multi-cloud for your organization from a security perspective. Continue Reading
Learn how the emerging technology called Secure Access Service Edge, or SASE, outperforms traditional architectures to deliver a more secure, better performing network. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
IT must incorporate a multi-cloud workload placement process into its multi-cloud strategy in order to maintain or improve cloud security and cloud operations. Continue Reading
The shared responsibility model of cloud security keeps data safe -- except when it doesn't. Prevent your workloads from being the next target of hackers. Continue Reading
An organization that doesn't fully participate -- or even understand -- its role in securing its data in the public cloud takes unnecessary risks. You need to do your part. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Protect your hybrid cloud environment against these five common security vulnerabilities. Avoid the risks with established strategies and public cloud tools. Continue Reading
There are two major security implications of serverless cloud infrastructure: secure coding and identity and access management. Uncover best practices to mitigate these risks. Continue Reading
The cloud-based identity and access management service does not come with certain defensive features turned on by default, which administrators should rectify. Continue Reading