Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling

Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling

If you haven’t kept up with the evolution of threat modeling, you probably envision threat modeling as simply a visualization tool or a framework like STRIDE. And while there was a time when this was the sum total of threat modeling capability, these are really just...
5 Cloud Attack Techniques to Know Now

5 Cloud Attack Techniques to Know Now

According to market research firm Gartner, public cloud computing services will grow to a $266.4 billion industry in 2020. This number represents a 17% growth over the previous year. A research vice president at Gartner stated that, “At this point, cloud adoption is...
Introduction to Kubernetes Container Orchestration

Introduction to Kubernetes Container Orchestration

In 2014, Google released Kubernetes, a platform that leverages containerization to run services and applications. Google has since turned Kubernetes into an open source project titled the Cloud Native Computing Foundation. Kubernetes is capable of provisioning and...
Modernize Your SQL Server Environment with VMware Cloud on AWS

Modernize Your SQL Server Environment with VMware Cloud on AWS

Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as monitoring and storage. VMware Cloud on AWS (Amazon Web Services) is committed to delivering steady software defined data...
How to Secure Your Amazon S3 File Storage Service

How to Secure Your Amazon S3 File Storage Service

Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of content, e.g. HTML web pages or financial data records. Whatever you store in an S3 bucket is comprised of data. Even...