Quantcast
Channel: Club Cloud Computing
Browsing latest articles
Browse All 77 View Live

Image may be NSFW.
Clik here to view.

Video: 5 elements of cloud security

Review this video to get up to speed on the 5 elements of cloud security. Cloud security includes IT security as we know it, but will evolve to be more mature than that. In the video I elaborate on...

View Article



Image may be NSFW.
Clik here to view.

Video: Use CCM and Caiq to assess cloud provider offerings

Have a look at this video to understand how the Cloud Controls Matrix (CCM) and the Consensus Assessment Initiative Questionnaire (CAIQ) can help in secure cloud adoption. The “Old Skool” approach for...

View Article

Image may be NSFW.
Clik here to view.

What is the best cloud computing security training?

Cloud security is important, because in cloud computing we need to make sure that everybody in the cloud IT supply chain is doing their jobs right. Cloud is scary, because we have to give up some...

View Article

Image may be NSFW.
Clik here to view.

Professionalizing cloud security education at the Hogeschool Utrecht

Coming September 1, 2019 I will assume a part-time associate professor position in “Cyber security and cloud”. This will be at the Hogeschool Utrecht (HU), which is a University of Applied Sciences. I...

View Article

A Small Tutorial Example of Cloud Native Development

Cloud-native software development enables new practices. But it also requires them. It is a new level of working. However, putting all these new practices together requires integrating a lot of pieces....

View Article


Learning to Secure Cloud Adoption, is this about you?

If you are interested in improving the skills you have for leading your company’s secure cloud adoption, read on. And maybe you are also interested in leading your team in this role. In any case, I...

View Article

Image may be NSFW.
Clik here to view.

Deployment diagrams for the cloud-native age

Deployment is everything that happens between writing software and actually using that software by its intended users. And as we get more software and more users, deployment becomes more complex. Why...

View Article

SaaS security checklist – three points to get you started

The security of your SaaS cloud solutions starts with the review of three major areas. Practically all companies are using SaaS providers in one way or another. SaaS includes Services such as Trello...

View Article


Image may be NSFW.
Clik here to view.

Deployment diagrams for network security – fix this

A while back, I introduced my take on deployment diagrams for cloud and devops infrastructure. Some of the big points there are: it starts with intuitive drawings. Many people draw these things in...

View Article


What is the problem that the Certificate of Cloud Audit Knowledge workshop is...

How is cloud audit different from IT audit as we know it? For starters, cloud brings new technology. And new technologies bring new risk. Then, the business model of cloud implies that security is now...

View Article
Browsing latest articles
Browse All 77 View Live




Latest Images