The CCSK Guide provides reliable and accurate information to cloud security professionals. We hope individuals seeking the Certificate of Cloud Security Knowledge will find further information specifically targeted at their CCSK pursuit.
Please review the user agreement for the forums and testing services. CCSK Guide requires registration before use of the testing services. We hope you find this service useful, and good luck on the exam!
We’ve seen a huge surge in interest in cloud computing. A couple of factors have been attributed to this change – first that it is one of the most disruptive technologies to have emerged on the playing field in the last decade. Secondly, the cloud technology adoption and application holds promise for the future. The […]
On Monday, January 12, President Obama called for more stringent legislation to protect student privacy, adding to the heated debate about the best way to integrate the benefits of technology into the classroom without unnecessarily exposing students to commercial data mining. An example from California The president urged Congress to impose new restrictions on companies […]
2015 is underway and people want to know the future of the cloud industry by the numbers. Currently in the US, there are 3.9 million jobs affiliated with cloud computing, with over 384,000 in IT alone. The median salary for IT professionals with cloud computing experience is $90,950 and the median salary for positions that […]
Cloud computing is currently being bolstered by a huge amount of confidence from almost every industry. It’s one of the most significant and disruptive technologies to emerge on the scene within the last decade. But what do the application of cloud technologies promise for the future? According to the RightScale 2014 survey entitled Cloud Computing […]
According to a report by Great Fire, the internet censorship watchdog, China’s state firewall is performing a Man-in-the-Middle (MITM) attack against Apple’s iCloud users. Allegedly, the attack has been launched in response to Apple’s new default encryption methods. Since the debut of iOS 8, authorities are no longer permitted to bypass on-device encryption to gain […]