The absence of a common framework for assessing Cloud Service Providers (CSPs), combined with the fact that no two CSPs are the same, complicates the process of selecting one that’s right for your organization. To help you work through this, we’re using this post to discuss seven basic factors you can use to identify a provider that can best match your business, technical, and operational needs.
In this post, we’re going to assume that you will be relying on public cloud infrastructure. There’s no reason to DIY (which can be costly, complex, and frustrating) when there are experts who can do it far better (no offense!). The shared responsibility model is such that you should be able to rely on cloud service providers to take care of the cloud itself while you focus on what’s in the cloud (your data and applications).
So, how do you choose a public cloud provider? First, it’s helpful to know who the major players are today. Read more “7 Factors to Help You Choose the Right Cloud Service Provider”
Security Vendor Assessment Worksheet
If you've been tasked with evaluating cloud security vendors, this is your starting point.
When Wombat Security Technologies and ThreatSim (acquired by Wombat in October 2015) decided to develop and deploy our suite of end user risk management and education solutions in Amazon Web Services (AWS), we went “into the cloud” with eyes wide open. We knew that, to realize the full potential of AWS (scale, cost, performance), we needed to “do AWS right.” This meant treating our servers like cattle, not like pets.
Read more “How Wombat Security Uses Threat Stack to Secure Its Own AWS Infrastructure”
Despite the rapidly growing need for cloud-native visibility into behavior and activity across AWS environments, companies are still learning about best practices for AWS security.
Read more “The Top 7 AWS Security Issues: What You Need to Know”
Do you know exactly who is accessing your data and applications in Amazon Web Services (AWS)?
According to Gartner’s Cloud Security Survey, more than a quarter of businesses are unable to answer that question with a resounding “YES.” With over one million AWS users, that means there are a lot of unprotected environments.
Read more “Top 10 Cloud Security Tips for Protecting Your Enterprise”
As National Cyber Security Awareness month comes to a close, it seems appropriate to reflect on the state of cyber security today. The ugly truth is that the cyber threat environment has never been more volatile. Breaches are commonplace, headlines on data loss and sophisticated hacks bombard us daily and technology continues to progress and move forward, in spite of security concerns and compromise. A huge portion of the general population’s personal data is exposed and, while seemingly everyone is aware there’s a problem, few are willing to take the preventative measures necessary to stop it.
Read more “Observations as Cyber Security Awareness Month Comes to a Close”