Cloud security

Cloud security
Not all SaaS solutions are equal Traditionally an organization needing a SIEM deployment has had two options. Either build, maintain and use the SIEM on-prem

September 14, 2016
Frank Siemons
Cloud security
Risk Management Most companies will experience a data breach in one form or another within the next few years. The relative estimates of the impacted organiz

August 11, 2016
Frank Siemons
Cloud security
Introduction Overview of the Last Article Our last article reviewed what a Biometrics in the Cloud infrastructure would like. Essentially, this involves plac

August 10, 2016
Ravi Das
Cloud security
Something all Information Security Controls have in common is the data output they produce in the form of logged events and alerts. With an increase in the s

July 13, 2016
Frank Siemons
Cloud security
Any good security professional is familiar with the term Data Sanitization. This is the process of deliberately, permanently, and irreversibly removing or de

June 07, 2016
Frank Siemons
Cloud security
I can bet that some of you might have missed the news about Star Wars, but there will be hardly any who do not know what Cloud computing is, as this has been

December 30, 2015
Security Ninja
Cloud security
Cloud-Based Applications and Protocols In the previous article, we established that security in cloud-based applications is important and searching for vulne

December 22, 2015
Dejan Lukan
Cloud security
Introduction There are a number of cloud-based applications that we use every day, without even thinking about it; the email service, search engines, website

November 20, 2015
Dejan Lukan
Cloud security
SecureDB, a company in the encryption-as-a-service space, has been up and running for about a year. After going through an intensive cybersecurity accelerato

October 26, 2015
Ian Palmer
Cloud security
Introduction It's a common occurrence. Enterprises are shifting all or part of their infrastructure to the cloud. This has been going on for a number of year

September 15, 2015
Dejan LukanGet your cloud skills certified!
- Cloud architecture
- Cloud management
- Cloud pentesting
- CSP security features
- And more
In this series
- Top 11 cloud computing certifications for 2025
- The rise of cloud computing: Trends and predictions
- Understanding the basics of cloud infrastructure: What you need to know
- How cloud security, data privacy, and cybersecurity convergence drives successful careers
- Secure cloud computing: What you need to know
- Working across multiple cloud service providers: CSP security learning path
- Securing cloud-based applications training: What you need to know
- Security risks of cloud migration
- DevSecOps in the Azure Cloud
- Amazon Athena Security: 6 essential tips
- Securing cloud endpoints: What you should know
- AWS security and compliance overview
- CloudGoat walkthrough series: IAM privilege escalation by attachment
- CloudGoat walkthrough series: EC2 server-side request forgery (SSRF)
- CloudGoat walkthrough series: Remote code execution
- CloudGoat walkthrough series: Lambda Privilege Escalation
- Information security strategy for the hybrid and multi-cloud
- CloudGoat walkthrough series: Cloud Breach S3
- CloudGoat walkthrough series: IAM privilege escalation by rollback
- Working with CloudGoat: The “vulnerable by design” AWS environment
- Malicious Amazon Machine Images (AMIs)
- Key findings from Ponemon’s State of Vulnerability Management in the Cloud and On-Premises report
- Cloud Pentesting Certification Boot Camp: The ultimate guide
- Cloud Based IDS and IPS Solutions [Updated 2019]
- AWS Security Monitoring Checklist [Updated 2019]
- Amazon Inspector: A cloud-based vulnerability assessment tool
- System administrator vs. cloud administrator
- 5 key cloud security use cases
- Deep Packet Inspection in the Cloud
- Honeypots in the Cloud
- Biometrics in the Cloud
- Open-Source Intelligence Collection in Cloud Platforms
- How to Safeguard Against the Privacy Implications of Cloud Computing
- AWS Cloud Security for Beginners — Part 2
- AWS Cloud Security for Beginners — Part 1
- AWS Security Monitoring Checklist — Part 2
- Rise of the Rogue Cloud: The Fundamental Security Mistake Enterprises Make and How to Correct It
- Controlling the Risks of Cloud-Enabled End-Point Security Products
- The Ultimate Guide to CCSP Certification
- Five Reasons Why Security Professionals Need the Cloud
- Amazon S3 Buckets-Hardening
- Cloud Service Reconnaissance
- Cloud Computing Security: Be Secure Before Moving to Cloud
- Cloud Technology Bringing New Possibilities in Threat Management
- Attacking the Cloud
- Man in the Cloud Attacks: Prevention and Containment
- Cloud originated DDoS attacks
- Where Is Your Data Safer? In the Cloud Or On Premise?
- DDOS Protection for Public Cloud Customers
- Security Barriers in the Adaptation of Cloud Technology
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!