CCSK Guide

Your Guide to Cloud Security Knowledge



The CCSK Guide provides reliable and accurate information to cloud security professionals. We hope individuals seeking the Certificate of Cloud Security Knowledge will find further information specifically targeted at their CCSK pursuit.
Please review the user agreement for the forums and testing services. CCSK Guide requires registration before use of the testing services. We hope you find this service useful, and good luck on the exam!

Limiting Student Data Mining

On Monday, January 12, President Obama called for more stringent legislation to protect student privacy, adding to the heated debate about the best way to integrate the benefits of technology into the classroom without unnecessarily exposing students to commercial data mining. An example from California The president urged Congress to impose new restrictions on companies […]

, , , , ,

Cloud Computing Jobs in 2015

2015 is underway and people want to know the future of the cloud industry by the numbers. Currently in the US, there are 3.9 million jobs affiliated with cloud computing, with over 384,000 in IT alone. The median salary for IT professionals with cloud computing experience is $90,950 and the median salary for positions that […]

, , ,

State of the Cloud Survey: Key Findings

Cloud computing is currently being bolstered by a huge amount of confidence from almost every industry. It’s one of the most significant and disruptive technologies to emerge on the scene within the last decade. But what do the application of cloud technologies promise for the future? According to the RightScale 2014 survey entitled Cloud Computing […]

, , ,

China’s MITM Attack Against Apple iCloud Users

According to a report by Great Fire, the internet censorship watchdog, China’s state firewall is performing a Man-in-the-Middle (MITM) attack against Apple’s iCloud users. Allegedly, the attack has been launched in response to Apple’s new default encryption methods. Since the debut of iOS 8, authorities are no longer permitted to bypass on-device encryption to gain […]

, , , , , ,

Previous Posts

Theme created by Powered by