Home | Blogs | Cloud Security
Container Security – Securing Docker Images

Container Security – Securing Docker Images

Digital transformation of enterprises has got a huge fillip with increasing adoption of containers. In fact containers are being used in mission-critical applications which indicate the maturity of its adoption. According to IDC survey conducted in January 2018, 85% of container adopters are using it for production apps, with 76% using containers for mission-critical applications. […]

Governance, Risk and Compliance in Cloud

Governance, Risk and Compliance in Cloud

Achieving high level of governance risk and compliance (GRC) standards in the Cloud is necessary given the speed and scale it accords; hyper-connected business environment; and stringent regulatory imperatives. While GRC is used in the same breath each function is separate and forms the basis of a security architecture and operational processes. Governance provides the […]

How to Strengthen Cloud Security

How to Strengthen Cloud Security

The rush to exploit Cloud advantages of speed and high velocity must be carefully balanced with thoughtful security. Given that attacks are increasingly more sophisticated and vicious, this has become even more pertinent. Often despite the best precautions someone, somewhere makes a mistake and hackers make the most of it. Automation—one of the hallmarks of […]

Continuous Compliance in Fast Paced Environment

The new business imperatives enabled by Cloud services namely the need for speed at scale and high velocity releases must be balanced by managing associated risks such as adhering to compliance and meeting IT security needs. The flip side of not managing risk is obvious—it amplifies the organization’s exposure to breaches causing irreparable damage; and […]

Cloud should not be exclusive but an integral part of IT strategy

Benefits of AWS Landing Zone

Organizations using  AWS Cloud end up having several accounts for different purposes including the need to manage operations with separate accounts for different departments, deployments, new projects, functional requirements such as dev, test and production, etc. The reasons may be numerous but the underlying reason remains the same—operational efficiency which ironically is compromised as chaos […]