Cloud security

Cloud security
Cloud computing is the latest trend these days, and most businesses and corporations have either fully transitioned their IT Infrastructure to the cloud or a

December 18, 2017
Security Ninja
Cloud security
Securing a Cloud deployment These days many organizations have migrated at least some of their IT services to a cloud environment. Cloud adaptation could be

September 08, 2017
Frank Siemons
Cloud security
Introduction This White Paper describes an approach for creating a secure cloud environment which helps Project Teams to deploy their projects easily in the

April 25, 2017
Sumit Bhattacharya
Cloud security
Business leaders know that they are answerable for cyber security and privacy threats, wherever they occur in disparate enterprise systems. What many do not

April 14, 2017
Irfan Shakeel
Cloud security
It is no surprise that the rapid growth of cloud adaptation has attracted much-unwanted attention from potentially harmful parties. Where a company used to b

April 13, 2017
Frank Siemons
Cloud security
Over the years, more and more information has been transferred to and stored within the many cloud platforms. Services such as Dropbox, OneDrive, and Google

February 15, 2017
Frank Siemons
Cloud security
The business model of a Cloud Service Provider certainly includes the capacity to supply very high-bandwidth Internet connectivity to and from its customers'

October 31, 2016
Frank Siemons
Cloud security
Companies create data at an absolutely astonishing rate these days and there’s no reason to think that’s going to change. While some of this information is n

October 12, 2016
Infosec
Cloud security
Public Cloud Adaption The rate of adaptation of cloud services by organizations over the recent years has been significant. Some of these organizations decid

October 11, 2016
Frank Siemons
Cloud security
Cloud computing adoption continues accelerating; research by IDG found that 69% of enterprises have either applications or infrastructures running in the clo

September 30, 2016
Irfan ShakeelIn this series
- Top 11 cloud computing certifications for 2025
- The rise of cloud computing: Trends and predictions
- Understanding the basics of cloud infrastructure: What you need to know
- How cloud security, data privacy, and cybersecurity convergence drives successful careers
- Secure cloud computing: What you need to know
- Working across multiple cloud service providers: CSP security learning path
- Securing cloud-based applications training: What you need to know
- Security risks of cloud migration
- DevSecOps in the Azure Cloud
- Amazon Athena Security: 6 essential tips
- Securing cloud endpoints: What you should know
- AWS security and compliance overview
- CloudGoat walkthrough series: IAM privilege escalation by attachment
- CloudGoat walkthrough series: EC2 server-side request forgery (SSRF)
- CloudGoat walkthrough series: Remote code execution
- CloudGoat walkthrough series: Lambda Privilege Escalation
- Information security strategy for the hybrid and multi-cloud
- CloudGoat walkthrough series: Cloud Breach S3
- CloudGoat walkthrough series: IAM privilege escalation by rollback
- Working with CloudGoat: The “vulnerable by design” AWS environment
- Malicious Amazon Machine Images (AMIs)
- Key findings from Ponemon’s State of Vulnerability Management in the Cloud and On-Premises report
- Cloud Pentesting Certification Boot Camp: The ultimate guide
- Cloud Based IDS and IPS Solutions [Updated 2019]
- AWS Security Monitoring Checklist [Updated 2019]
- Amazon Inspector: A cloud-based vulnerability assessment tool
- System administrator vs. cloud administrator
- 5 key cloud security use cases
- Deep Packet Inspection in the Cloud
- Honeypots in the Cloud
- Biometrics in the Cloud
- Open-Source Intelligence Collection in Cloud Platforms
- How to Safeguard Against the Privacy Implications of Cloud Computing
- AWS Cloud Security for Beginners — Part 2
- AWS Cloud Security for Beginners — Part 1
- AWS Security Monitoring Checklist — Part 2
- Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It
- Controlling the Risks of Cloud-Enabled End-Point Security Products
- The Ultimate Guide to CCSP Certification
- Five Reasons Why Security Professionals Need the Cloud
- Amazon S3 Buckets-Hardening
- Cloud Service Reconnaissance
- Cloud Computing Security: Be Secure Before Moving to Cloud
- Cloud Technology Bringing New Possibilities in Threat Management
- Attacking the Cloud
- Man in the Cloud Attacks: Prevention and Containment
- Cloud originated DDoS attacks
- Where Is Your Data Safer? In the Cloud Or On Premise?
- DDOS Protection for Public Cloud Customers
- Security Barriers in the Adaptation of Cloud Technology
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!