At this year’s AWS Summit Sydney, I was invited to speak about security culture and share a few practical examples of how organizations can build a positive security culture through increased visibility and enablement at all levels. But, what is a positive security culture? At Xero, we take a customer-centric approach with our product teams…
With GDPR coming into force later this month, security and compliance will be the top-most priority for any cloud deployment that contains personal data of EU citizens. While leading providers have moved to make their platforms and services compliant, ensuring compliance requires more than just technology. Companies will also need to invest time and resources..
Cloud Academy is proud to be a sponsor of AWS Summit London coming up May 9-10 at the ICC, ExCeL, London. Join us in booth S24, Level 1 where our AWS experts will be on hand to answer your questions and walk you through our latest content and newest platform features. Book a meeting with..
George Gerchow is Chief Security Officer at Sumo Logic and Adjunct Honorary Lecturer at Cloud Academy. View the on-demand recording of our recent webinar, Establishing a Privacy Program: GDPR Compliance & Beyond with Mr. Gerchow and Jen Brown, Data Protection Officer at Sumo Logic. In 2016, my Data Protection Officer and I felt like the..
Securing your data and applications in the cloud has never been more important. The headlines are a constant reminder of the disruptive (or calamitous) impact on a business in the wake of a breach. Many of 2017’s most high-profile breaches were a reminder of the vulnerabilities that can come from both inside and outside your..
The State of Cloud Security Companies in every industry are eager to leverage the benefits of the cloud and leave data center management and legacy technologies behind. As cost optimization and increased scale drive cloud adoption from the inside, the need to stay competitive to keep pace with market changes drives it from the outside…
Effective security requires close control over your data and resources. Bastion hosts, NAT instances, and VPC peering can help you secure your AWS infrastructure. Welcome to part four of my AWS Security overview. In part three, we looked at network security at the subnet level. This time, we’ll look at strategies to avoid unnecessarily exposing..
Security is still one of the first questions companies have when it comes to the cloud. Ahead of re:Invent 2017, AWS has already announced new encryption and security features for its Simple Storage Service (S3) and a new service, AWS PrivateLink, for keeping traffic secure between AWS services and VPC Endpoints. Naturally, you’ll want to know..
Our third episode of Inside the Cloud is all about Microsoft Azure. In this episode, we’ll be focusing on the host of new services and updates on Azure Security, Migration, and Storage recently announced on Microsoft Azure following its annual Ignite conference, held last month in Orlando. Microsoft Azure’s hybrid cloud platform continues to be a strong..
Security is IT’s top spending priority according to the 2017/2018 Computer Economics IT Spending & Staffing Benchmarks report*. Given the frequent changes and updates in vendor platforms, the pressure is on for IT teams who need to keep their infrastructures and data secure. As breaches and attacks become more sophisticated, teams will need to get..