Where Should You Be Focusing Your AWS Security Efforts?
Another day, another re:Invent session! This time I listened to Stephen Schmidt’s session, “AWS Security: Where we've been, where we're going.” Amo...
VPN Encryption: How to Find the Best Solution
Each day there are 2.5 quintillion bytes of data created. People in all corners of the earth use the internet all day, every day. When we browse so...
Can the Cloud be Trusted with Your Business Data?
There are so many benefits to storing your data in the cloud – but a lot of businesses are against using the cloud due to concerns over security. I...
6 Ways to Prevent a Data Breach
The cloud is a new territory for the digital world. But with all of its benefits, there also come risks and dangers. If your business depends on th...
OWASP Top 10 Vulnerabilities
Over the last few years, more than 10,000 Open Web Application Security Project (OWASP) vulnerabilities have been reported into the Common Vulnerab...
8 Ways to Protect Your Data From a Ransomware Attack
Ransomware attacks have continued to grow both in scope and audacity over the past several years. This type of malware has become one of the big...
How to Use Artificial Intelligence (AI) to Beef up Cybersecurity
How can AI help cybersecurity? As data breaches and privacy incidents become more common than ever, cybersecurity is the top priority for business...
New on Cloud Academy: Git Labs, CKA and CKAD Lab Challenges, AWS and Azure Learning Paths, AGILE, and Much More
Our Content Team really kicked it into overdrive with tons of new content this month. You’ll be amazed at the number of new learning paths, c...
How to Encrypt an EBS Volume
Keeping data and applications safe in the cloud is one of the most visible challenges facing cloud teams in 2020. Cloud storage services where data...
How to Become a Cybersecurity Professional
Highly skilled cybersecurity professionals are in high demand, and now is the perfect time to get involved in this highly exciting and fascinating ...