Nine cloud security threats you don’t want to ignore

Source – techtarget.com The following is an excerpt from The Official (ISC)2 Guide to the CCSP CBK, Second Edition, by Adam Gordon, CISSP-ISSAP, ISSMP, SSCP. This section from Domain 1 describes nine cloud security threats waiting to pounce on unsuspecting enterprises. Whether you’re managing a public, private or hybrid cloud, it’s essential for information security professionals to understand where vulnerabilities lie and how to mitigate them. Threats form a real and ever-evolving challenge for organizations to counteract and defend against. Whether they

Read more

Docker Containers: What Makes Them So Portable?

Source – networkcomputing.com One of the main benefits in using Docker and container technology is the portability of applications. It’s possible to spin up an application on-site or in a public cloud environment in a matter of minutes. What enables this is a storage technology that implements a layered “copy on write” approach to storing data in the file system used by Docker itself. Let’s take a look at how it works… Read More

Read more