Cloud security can seem like a black box, especially to those who are new adopters. Here, we define what cloud security is and look into how it works.
Lois Neville
Marketing
Shamyla Riaz, MS
Cloud and IoT Expert
Christina Harker, PhD
Marketing
Daniel McNeela
Machine Learning Engineer and DevOps Expert
Cloud Compliance / Cloud Management / Cloud Security
Securing Containerized Applications in the Cloud: Navigating Technical Challenges and Complexity
This article discusses the importance of container security and outlines common vulnerabilities, such as misconfigurations and insecure container images. The article also covers strategies for securing containerized applications, including network segmentation, access controls, and runtime protection. The article goes on to address the challenges associated with implementing these strategies.
Christina Harker, PhD
Marketing
Cloud Management / Development
Infrastructure as Code Tools: Managing the Cloud
In order to effectively manage cloud infrastructure at any scale, enterprise organizations need to make use of infrastructure as code tools, treating their application infrastructure configuration as they would their standard application code. Manually provisioning infrastructure simply isn't viable at the scale of modern cloud applications, and ClickOps will lead to spiraling costs and likely security vulnerabilities.
Christina Harker, PhD
Marketing