Cloud security

Cloud security You may need to do a quick third-party registration to access certain ones.

Articles
  • Keeping your Web applications in check with HIPAA compliance
  • Protecting Web applications with network controls – Is it effective? (formerly published at algosec.com)
  • Dealing with vendors who want to push their SOC audit reports on you (formerly published at it.toolbox.com)
  • Key Network Security Questions You Need To Ask Your Cloud Vendors – Now! (formerly published at algosec.com)
  • Your network versus the cloud – what’s more secure? (formerly published at it.toolbox.com)
  • Software-defined security: The future of network security? (formerly published at techtarget.com)
  • IT needs to keep up with workers who use desktop cloud backup (formerly published at techtarget.com)
  • Security Considerations When Using AWS Cloud Services (formerly published at it.toolbox.com)
  • The Big Security Oversight When Using Amazon Web Services (formerly published at it.toolbox.com)
  • How do software quality pros navigate cloud computing security issues? (formerly published at techtarget.com)
  • Lessons learned from a web security breach
  • Preventing online backup security threats to your network (formerly published at techtarget.com)
  • Data security and backup encryption remain critical (formerly published at techtarget.com)
  • Secure data storage strategies and budget-friendly security tools for SMBs (formerly published at techtarget.com)
  • Dark Cloud Looming?
  • What’s your take on cloud security?
  • Firewall change management and automation can curb human error (formerly published at techtarget.com)
  • Do Web application firewalls complicate enterprise security strategy? (formerly published at techtarget.com)
  • Planning a virtualization firewall strategy (formerly published at techtarget.com)
  • The cloud’s compliance complexities you cannot ignore (formerly published at techtarget.com)
  • Top questions that must be answered before taking on the cloud (formerly published at techtarget.com)
  • Security oversights in the cloud: Asking the tough questions (formerly published at techtarget.com)
  • Cloud computing and application security: Issues and risks
Webcasts
  • Five Considerations for the Other SaaS – Security as a Service
  • Ensuring PCI DSS Compliance in the Cloud

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: