In the past couple of years, a new range of solutions and technologies known as Cloud Access Security Brokers (CASB) have emerged in-order to provide...
Author - Eyal Estrin
In a previous post we explained the basic concepts of encryption. In this chapter we will focus on the various solutions offered by public cloud...
The goal of this post is to present a common case study for building a research environment in Google Cloud Platform (GCP). Building an environment...
The goal of this post is to present a common case study for building a research environment in Azure. Building an environment in the cloud involves...
The goal of this post is to present a common case study for building a research environment in AWS. Building an environment in the cloud involves...
Working with public cloud providers raises many security challenges for customers, due to the fact that they do not control physical access to the...
This document addresses another important aspect of cloud security – Identity Management. As the concepts and terms might be different between...
This document addresses another important aspect of cloud security – Identity Management. While the concepts are common, the implementation...
This document addresses another important aspect of cloud security – Identity Management. As the concepts and terms might be different between...
This document addresses another important aspect of cloud security – the network. As network security is specific to each cloud service provider...