Cloud Security

Cloud Security

What is Cloud Workload Security?

What is Cloud Workload Security?

A cloud workload is a distinct capacity or work function that we put on a cloud instance. It can be a Hadoop node, a Web server, a database, or a container, among ...
Evaluating Risk Critical to Cloud Security

Evaluating Risk Critical to Cloud Security

According to CloudAcademy’s “November 2018 Data Report,” the world is trending toward multi-cloud. In fact, multi-cloud environments have become such a reality that DevOps engineers are now expected to have concurrent proficiency ...
Security Boulevard

4 Big Security Lessons from the Marriott Starwood Data Breach

The post 4 Big Security Lessons from the Marriott Starwood Data Breach appeared first on Delta Risk ...

CompTIA Cloud+ Certification: An Overview

| | cloud computing
The use of the cloud continues to grow as private citizens and businesses see the benefits of offsite storage and shared services. Many companies are coming to rely on this technology, as ...
How well do email security gateways protect against targeted attacks?

How well do email security gateways protect against targeted attacks?

Email security test explores how and when services detect and stop threats. Latest report now online. This new email protection test shows a wide variation in the abilities of the services that ...
Cross-Platform FDE Simplified

Cross-Platform FDE Simplified

Until now, tools for enabling and managing full disk encryption (FDE) solutions have been limited to a single OS: capable of enforcing FDE exclusively on Macs® or Windows®, but generally not both ...
Ensuring a Secure Cloud Journey in a World of Containers

Ensuring a Secure Cloud Journey in a World of Containers

As organizations transition to the cloud, many are adopting microservice architecture to implement business applications as a collection of loosely coupled services, in order to enable isolation, scale, and continuous delivery for ...

Achieve Security Through Compliance in the Cloud

| | CIS, Cloud, Compliance
Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy ...
Managing Your Clients' Networks with a Cloud Domain Controller

Managing Your Clients’ Networks with a Cloud Domain Controller

| | Blog, Cloud Infrastructure
A major part of a managed service provider’s (MSP) role is to run and manage their clients’ networks. As a result, MSPs must make a very important decision: what are the best ...
Defending Credentials From Automated Attack Tools

Defending Credentials From Automated Attack Tools

|
By Danny Wasserman The folks on the Akamai Professional Services team are the people who help implement, configure, and tune the cloud security products that protect our customers' web applications from the ...
Loading...