New & Notable
Security in the Cloud: Cloud Computing Architecture News
April 01, 2020
AWS has released Amazon Detective, a managed threat hunting service that generates visualizations out of log data from native Amazon Web Services.
March 20, 2020
AI-driven SecOps tools spared Las Vegas from a major data breach in January. The city now bets that two-factor authentication can stop future attempts.
March 05, 2020
Business email compromise and email account compromise attacks are increasing and evolving. To keep up with threat actors, Proofpoint says a new approach is required.
February 07, 2020
Kubernetes platform security has supplanted container-level security for enterprises such as retail software vendor Aptos as they deploy microservices in production.
Security in the Cloud: Cloud Computing Architecture Get Started
Bring yourself up to speed with our introductory content
The shared responsibility model of cloud security keeps data safe -- except when it doesn't. Prevent your workloads from being the next target of hackers. Continue Reading
Cloud computing is a general term for anything that involves delivering hosted services over the internet. Continue Reading
The nature of cloud environments and workloads is changing. Security team approaches must evolve in response. Learn how to implement zero-trust cloud security from expert Dave Shackleford. Continue Reading
Evaluate Security in the Cloud: Cloud Computing Architecture Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate the following hybrid cloud use cases, as well as the common advantages and disadvantages that come with pairing on-premises architectures and different cloud models. Continue Reading
With multi-cloud and privacy regulations becoming the new normal, infosec teams need data discovery tools and services to keep up. Learn more about available cloud options. Continue Reading
Security teams need information and context about data in order to keep it safe. Learn how Cartography, Lyft's open source asset tracking tool, creates highly comprehensive maps. Continue Reading
Manage Security in the Cloud: Cloud Computing Architecture
Learn to apply best practices and optimize your operations.
IT must incorporate a multi-cloud workload placement process into its multi-cloud strategy in order to maintain or improve cloud security and cloud operations. Continue Reading
An organization that doesn't fully participate -- or even understand -- its role in securing its data in the public cloud takes unnecessary risks. You need to do your part. Continue Reading
Hybrid can be an appealing -- yet daunting -- cloud architecture for IT teams looking for flexibility. Review these five best practices to ensure you maximize the benefits without compromising your workloads. Continue Reading
Problem Solve Security in the Cloud: Cloud Computing Architecture Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The cloud-based identity and access management service does not come with certain defensive features turned on by default, which administrators should rectify. Continue Reading
The shared responsibility model delineates where company and CSP security responsibilities start and end. This is critical not only for compliance, but also the big security picture. Continue Reading
Container escape vulnerabilities create new challenges for security and risk management teams. Learn more about container escapes and how to prevent exploitation. Continue Reading