<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cloud Computing</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cloud Computing</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/cloud-computing/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 16 Jan 2023 00:00:00 -0500</lastBuildDate><item><title>Mothra: Network Situational Awareness at Scale</title><link>https://www.sei.cmu.edu/blog/mothra-network-situational-awareness-at-scale/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog introduces the SEI's Mothra tool, summarizes our recent research on improvements to Mothra designed to handle large-scale environments, and describes research aimed at demonstrating Mothra’s effectiveness at “cloud scale” in the Amazon Web Services (AWS) GovCloud environment.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Ruef</dc:creator><pubDate>Mon, 16 Jan 2023 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/mothra-network-situational-awareness-at-scale/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category></item><item><title>Operating at the Edge</title><link>https://www.sei.cmu.edu/blog/operating-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Concepts and challenges for operating in remote locations away from central computing resources where resources are constrained (the edge).</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marc Novakouski, Grace Lewis</dc:creator><pubDate>Mon, 29 Nov 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/operating-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category><category>Handheld Devices</category><category>Tactical Systems</category><category>Edge-Enabled Systems</category><category>Edge Computing</category></item><item><title>Operation Cloud Hopper Case Study</title><link>https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In December, a grand jury indicted members of the APT10 group for a tactical campaign known as Operation Cloud Hopper, a global series of sustained attacks against managed service providers and, subsequently, their clients....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nathaniel Richmond</dc:creator><pubDate>Mon, 04 Mar 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category><category>Software and Information Assurance</category></item><item><title>Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018</title><link>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December 31, 2018....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 07 Jan 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Autonomy and Counter-Autonomy</category><category>Cloud Computing</category><category>Data Modeling and Analytics</category><category>Mission Assurance</category><category>Software and Information Assurance</category></item><item><title>Infrastructure as Code: Moving Beyond DevOps and Agile</title><link>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Citing the need to provide a technical advantage to the warfighter, the Department of Defense (DoD) has recently made the adoption of cloud computing technologies a priority....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">John Klein</dc:creator><pubDate>Mon, 11 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/infrastructure-as-code-moving-beyond-devops-and-agile/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Devops</category><category>Cloud Computing</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Agile</category></item><item><title>Best Practices for Cloud Security</title><link>https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As detailed in last week's post, SEI researchers recently identified a collection of vulnerabilities and risks faced by organizations moving data and applications to the cloud....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Donald Faatz</dc:creator><pubDate>Mon, 12 Mar 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cloud Computing</category><category>Human-Machine Interactions</category></item><item><title>12 Risks, Threats, &amp; Vulnerabilities in Moving to the Cloud</title><link>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Organizations continue to develop new applications in or migrate existing applications to cloud-based services. The federal government recently made cloud-adoption a central tenet of its IT modernization strategy....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Morrow</dc:creator><pubDate>Mon, 05 Mar 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category><category>Cloud Computing</category><category>Situational Awareness</category></item><item><title>Head in the Clouds</title><link>https://www.sei.cmu.edu/blog/head-in-the-clouds/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The transition from on-premises information systems to cloud services represents a significant, and sometimes uncomfortable, new way of working for organizations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matthew Butkovic</dc:creator><pubDate>Wed, 14 Feb 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/head-in-the-clouds/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Mission Assurance</category><category>Insider Threat</category><category>Cloud Computing</category></item><item><title>Establishing Trust in Disconnected Environments</title><link>https://www.sei.cmu.edu/blog/establishing-trust-in-disconnected-environments/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores techniques for establishing and maintaining trust in disconnected or intermittent network environments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grace Lewis</dc:creator><pubDate>Mon, 27 Feb 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/establishing-trust-in-disconnected-environments/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category><category>Software and Information Assurance</category><category>Mission Assurance</category></item><item><title>Tactical Cloudlets: Moving Cloud Computing to the Edge</title><link>https://www.sei.cmu.edu/blog/tactical-cloudlets-moving-cloud-computing-to-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post is part of a series that explores the use of tactical cloudlets as a strategy for providing infrastructure to support computation offload.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grace Lewis</dc:creator><pubDate>Mon, 10 Nov 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/tactical-cloudlets-moving-cloud-computing-to-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category></item><item><title>The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/latest-research-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post provides a summary of recent research conducted at the SEI in areas including cybersecurity, software engineering, and AI.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 27 Jan 2014 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/latest-research-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Team Software Process (TSP)</category><category>Insider Threat</category><category>Cloud Computing</category><category>System of Systems</category><category>Software Architecture</category></item><item><title>Application Virtualization for Cloudlet-Based Cyber-Foraging at the Edge</title><link>https://www.sei.cmu.edu/blog/application-virtualization-for-cloudlet-based-cyber-foraging-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses how application virtualization can enhance cloudlet-based cyber foraging at the edge and improve performance.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grace Lewis</dc:creator><pubDate>Mon, 08 Jul 2013 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/application-virtualization-for-cloudlet-based-cyber-foraging-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category></item><item><title>Standards in Cloud Computing Interoperability </title><link>https://www.sei.cmu.edu/blog/standards-in-cloud-computing-interoperability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In 2011, Col. Timothy Hill, director of the Futures Directorate within the Army Intelligence and Security Command, urged industry to take a more open-standards approach to cloud computing. "Interoperability between clouds, as well as the portability of files from one cloud to another, has been a sticking point in general adoption of cloud computing," Hill said during a panel at the AFCEA International 2011 Joint Warfighting Conference. Hill's view has been echoed by many in the cloud computing community, who believe that the absence of interoperability has become a barrier to adoption. This posting reports on recent research exploring the role of standards in cloud computing and offers recommendations for future standardization efforts....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grace Lewis</dc:creator><pubDate>Mon, 04 Mar 2013 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/standards-in-cloud-computing-interoperability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category></item><item><title>The Latest Research from the SEI</title><link>https://www.sei.cmu.edu/blog/latest-research-sei9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the latest work of SEI technologists in information assurance and agile, the Team Software Process (TSP), and CERT secure coding standards.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 26 Nov 2012 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/latest-research-sei9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Assurance</category><category>Secure Coding</category><category>Team Software Process (TSP)</category><category>Cloud Computing</category><category>Agile</category></item><item><title>Insider Threats Related to Cloud Computing--Installment 10: Conclusion</title><link>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-10-conclusion/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover CERT's conclusion on the current state of cloud-related insider threats and vision for the future in Part 10 of this SEI Blog series.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The CERT Insider Threat Center</dc:creator><pubDate>Mon, 01 Oct 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-10-conclusion/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cloud Computing</category></item><item><title>Insider Threats Related to Cloud Computing--Installment 9: Two More Proposed Directions for Future Research</title><link>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-9-two-more-proposed-directions-for-future-research/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about two future research for cloud-related insider threats, normal user behavior analysis and policy integration, in Part 9 of this SEI Blog series.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The CERT Insider Threat Center</dc:creator><pubDate>Mon, 24 Sep 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-9-two-more-proposed-directions-for-future-research/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cloud Computing</category></item><item><title>Insider Threats Related to Cloud Computing--Installment 8: Three More Proposed Directions for Future Research in Detail</title><link>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-8-three-more-proposed-directions-for-future-research-in-detail/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses three areas of future research for cloud-related insider threats: cloud-based indicators of threats, virtualization, and reporting.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The CERT Insider Threat Center</dc:creator><pubDate>Mon, 17 Sep 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-8-three-more-proposed-directions-for-future-research-in-detail/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cloud Computing</category></item><item><title>Insider Threats Related to Cloud Computing--Installment 7: Seven Proposed Directions for Research and Two in Detail</title><link>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-7-seven-proposed-directions-for-research-and-two-in-detail/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover 7 new directions for cloud-related insider threat research, including socio-technical approaches and predictive models in Part 7 of this SEI Blog series.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The CERT Insider Threat Center</dc:creator><pubDate>Wed, 12 Sep 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-7-seven-proposed-directions-for-research-and-two-in-detail/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cloud Computing</category></item><item><title>Insider Threats Related to Cloud Computing--Installment 6: Securing Against Other Cloud-Related Insiders</title><link>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-6-securing-against-other-cloud-related-insiders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn about how to secure against cloud exploits and insiders who use the cloud against you in Part 6 of this SEI Blog series.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The CERT Insider Threat Center</dc:creator><pubDate>Tue, 04 Sep 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/insider-threats-related-to-cloud-computing-installment-6-securing-against-other-cloud-related-insiders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cloud Computing</category></item><item><title>Upcoming Appearances by CERT Insider Threat Experts</title><link>https://www.sei.cmu.edu/blog/upcoming-appearances-by-cert-insider-threat-experts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>CERT is excited to announce upcoming in-person and virtual appearances by insider threat experts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">The CERT Insider Threat Center</dc:creator><pubDate>Thu, 30 Aug 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/upcoming-appearances-by-cert-insider-threat-experts/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Insider Threat</category><category>Cloud Computing</category></item></channel></rss>