
Blog Posts
A Method for Assessing Cloud Adoption Risks
The move to a cloud environment provides significant benefits. Realizing these benefits, however, requires organizations to manage associated organizational and technical risks effectively.
• By Christopher Alberts
In Cloud Computing

Operation Cloud Hopper Case Study
In December, a grand jury indicted members of the APT10 group for a tactical campaign known as Operation Cloud Hopper, a global series of sustained attacks against managed service providers …
• By Nathaniel Richmond
In Cloud Computing

Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018
Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December …
• By Douglas C. Schmidt
In Cloud Computing

Best Practices for Cloud Security
As detailed in last week's post, SEI researchers recently identified a collection of vulnerabilities and risks faced by organizations moving data and applications to the cloud....
• By Donald Faatz
In Cloud Computing

12 Risks, Threats, & Vulnerabilities in Moving to the Cloud
Organizations continue to develop new applications in or migrate existing applications to cloud-based services. The federal government recently made cloud-adoption a central tenet of its IT modernization strategy....
• By Timothy Morrow
In Cloud Computing

Head in the Clouds
The transition from on-premises information systems to cloud services represents a significant, and sometimes uncomfortable, new way of working for organizations....
• By Matthew Butkovic
In Cloud Computing

Establishing Trust in Disconnected Environments
First responders, search-and-rescue teams, and military personnel often work in "tactical edge" environments defined by limited computing resources, rapidly changing mission requirements, high levels of stress, and limited connectivity. In …
• By Grace Lewis
In Cloud Computing

Tactical Cloudlets: Moving Cloud Computing to the Edge
Soldiers in battle or emergency workers responding to a disaster often find themselves in environments with limited computing resources, rapidly-changing mission requirements, high levels of stress, and limited connectivity, which …
• By Grace Lewis
In Cloud Computing

The Latest Research from the SEI
As part of an ongoing effort to keep you informed about our latest work, I would like to let you know about some recently published SEI technical reports and notes. …
• By Douglas C. Schmidt
In Cloud Computing

Application Virtualization for Cloudlet-Based Cyber-Foraging at the Edge
Soldiers and emergency workers who carry smartphones in the battlefield, or into disaster recovery sites (such as Boston following the marathon bombing earlier this year) often encounter environments characterized by …
• By Grace Lewis
In Cloud Computing
