Establishing a Cloud Center of Excellence

cloud being displayed on many screen types

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.9.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ sticky_enabled=”0″] The Cloud is a Model…Not a Place As more and

Introduction to the NIST Cybersecurity Framework

cyber security image

Security Framework Based on Standards, Guidelines, and Practices The NIST Cybersecurity Framework (NIST CSF) was created via a collaboration between the United States government and industry as a voluntary framework

How to Talk with Your Team About Cloud Strategy

cloud strategy blue image

Executing an Actionable Cloud Technology Strategy When it comes to the increasing demand for IT Operations solutions that impact core business strategies, it is no secret that cloud computing has

Understanding CIS Controls and Benchmarks

CIS Controls graphic

Security Controls and Benchmarks Help Facilitate Governance In a conversation about cyber security or cyber defense, you might hear the terms CIS and security controls mentioned as a recommended best

What the Convergence of IaaS and PaaS Means for Cloud Governance

lighthouse with green swirls

Since the advent of cloud computing, there have been three almost universally agreed upon cloud service models: Infrastructure-as-a-Service (IaaS), Platform-as-a-service (PaaS), and Software-as-a-Service (SaaS). By now, most people have a general understanding

Building a Compliance Conscious Company

compliance company

Cloud Compliance is Dependent on People and Technology Regulatory standards abound in the cloud. Healthcare has HIPAA, the federal government has FedRAMP, and financial companies must comply with SOC and