Cloud security

Cloud security You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted.

Articles
  • Keeping your Web applications in check with HIPAA compliance
  • Protecting Web applications with network controls – Is it effective?
  • Dealing with vendors who want to push their SOC audit reports on you
  • Key Network Security Questions You Need To Ask Your Cloud Vendors – Now!
  • Your network versus the cloud – what’s more secure?
  • Software-defined security: The future of network security?
  • IT needs to keep up with workers who use desktop cloud backup
  • Security Considerations When Using AWS Cloud Services
  • The Big Security Oversight When Using Amazon Web Services
  • How do software quality pros navigate cloud computing security issues?
  • Lessons learned from a web security breach
  • Preventing online backup security threats to your network
  • Data security and backup encryption remain critical
  • Secure data storage strategies and budget-friendly security tools for SMBs
  • Dark Cloud Looming?
  • What’s your take on cloud security?
  • Firewall change management and automation can curb human error
  • Do Web application firewalls complicate enterprise security strategy?
  • Planning a virtualization firewall strategy
  • The cloud’s compliance complexities you cannot ignore
  • Top questions that must be answered before taking on the cloud
  • Security oversights in the cloud: Asking the tough questions
  • Cloud computing and application security: Issues and risks
Webcasts
  • Five Considerations for the Other SaaS – Security as a Service
  • Ensuring PCI DSS Compliance in the Cloud

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: