cloud security

Securing Serverless Applications in Azure

Serverless is all about unleashing developer productivity by reducing the management burden and allowing you to focus on the application logic. But even for serverless applications, security is key! This presentation will guide you on how to secure your Azure Serverless applications. We are going to take a look at the different options for securing …

Securing Serverless Applications in Azure Read More »

code screen

Prevent S3 Bucket Leaks with 5 Best Practices for AWS Cloud Security

When it comes to cloud services, the name AWS is nearly synonymous with the public cloud. Although Amazon’s grip on the cloud might be loosening (however slowly), there’s no question that AWS with its estimated 47% market share is a cloud behemoth. This means that for many businesses, cloud security starts with AWS security. Within …

Prevent S3 Bucket Leaks with 5 Best Practices for AWS Cloud Security Read More »

Top Cloud Native Security Lessons

Cloud native technologies such as Kubernetes, Docker, Istio and more are becoming the foundations of software development and infrastructure deployments. With these new technologies, a new set of lessons on security need to be understood and applied. This talk presents the top security lessons from running cloud-native infrastructure and what everyone should know if they …

Top Cloud Native Security Lessons Read More »

Kubernetes Runtime Security

The Kubernetes open source cluster management system provides the mechanisms through which you interact with your cluster. You use Kubernetes commands and resources to deploy and manage your applications, perform administration tasks and set policies, and monitor the health of your deployed workloads. When you run a Kubernetes Engine cluster, you also gain the benefit …

Kubernetes Runtime Security Read More »

End-to-end Encryption in Cloud Services

Cloud-hosted services have many advantages, but commonly-deployed cloud architectures have a number of weaknesses when it comes to data management. In particular, when a third party has direct access to your data, that third party becomes an attractive target both for malicious attack and for lawful access via subpoenas served to the third party alone. …

End-to-end Encryption in Cloud Services Read More »

cloud computing software development article

Virtualization Security in Cloud Computing

Bringing VMs (virtual machines) onto the cloud has become increasingly popular. Recent years have seen great advancements in both cloud computing and virtualization. On one hand there is the ability to pool various resources to provide software-as-a-service, infrastructure-as-a-service and platform-as-a-service. At its most basic, this is what describes cloud computing. On the other hand, we …

Virtualization Security in Cloud Computing Read More »

cloud computing software development article

Cloud Survey Find Need for Better Security and Performance Monitoring

AccelOps announced findings from its recent survey of 176 IT security professionals conducted online and at the RSA Conference 2013. While 65 percent of respondents’ organizations are using cloud services today, only 46 percent have moved mission-critical applications and data outside the enterprise. Significant inhibitors remain in ensuring effective cloud security and 39 percent of …

Cloud Survey Find Need for Better Security and Performance Monitoring Read More »

cloud computing software development article

Distributed Access Control Architecture for Cloud Computing

Cloud computing has specific security challenges as multi-tenancy and virtualization fea­tures create risks due to sharing of physical resources among potential untrusted tenant. Het­erogeneity of services also requires different degrees of granularity in access control mechanisms. This article discusses a distributed architecture based on principles from security management and software engineering to address cloud computing’s …

Distributed Access Control Architecture for Cloud Computing Read More »