security configuration management

Need to Know How to Secure Big Data? How About 100 Ways?

While Paul Simon found that there are 50 Ways to Leave your Lover, the Cloud Security Alliance (CSA) found that there...

Ensuring Security in a Continuous Delivery Pipeline

In our previous post, we covered some of the major holdups when it comes to secure continuous delivery. But what does...

The Good, The Bad, and The UI

The Evident Security Platform (ESP) is already the premier AWS security monitoring software, but now it’s even...

New AWS Key Management Service Offers Centralized Control

AWS has launched a new import key feature which allows users to import keys from their own key management...

AWS Releases Cloud Adoption Maturity Model Guidelines

AWS has released the Cloud Adoption Maturity Model, a set of guidelines intended to assist in the development of a...

AWS Security Best Practice #0: CloudTrail and Encryption

Moving your architecture to AWS in whole or part also means that your team reaps the rewards of new changes and services...

Cloud Security Alliance US Congress 2016

The Cloud Security Alliance (CSA) recently released the event schedule for the next U.S. conference scheduled to...

Attackers Can Abuse AWS Services to Gain Persitence

In a session titled Account Jumping Post Infection Persistency & Lateral Movement in AWS at the BlackHat...

Continuous Delivery: What’s the Hold Up?

Software development is evolving from ambitious projects that are built over the course of months and years, and...

Evident.io: The 451 Research Impact Report

A company’s entire cloud-based infrastructure can be created, modified, deleted or reconfigured in real time via the...

Orchestrating Security in the Cloud

The SANS Institute recently surveyed 485 IT pros investing in private and/or public cloud infrastructure about their...

Gigaom Research Whitepaper: Continuous Security and Reliability

This report will help IT executives and development teams understand the new approaches to security required in a...