<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Cloud Computing</title><link href="http://www.sei.cmu.edu/feeds/topic/cloud-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://www.sei.cmu.edu/feeds/topic/cloud-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://www.sei.cmu.edu/feeds/topic/cloud-computing/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2023-01-16T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Cloud Computing</subtitle><entry><title>Mothra: Network Situational Awareness at Scale</title><link href="https://www.sei.cmu.edu/blog/mothra-network-situational-awareness-at-scale/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-01-16T00:00:00-05:00</published><updated>2023-01-16T00:00:00-05:00</updated><author><name>Daniel Ruef</name></author><id>https://www.sei.cmu.edu/blog/mothra-network-situational-awareness-at-scale/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog introduces the SEI's Mothra tool, summarizes our recent research on improvements to Mothra designed to handle large-scale environments, and describes research aimed at demonstrating Mothra’s effectiveness at “cloud scale” in the Amazon Web Services (AWS) GovCloud environment.</summary><category term="Cloud Computing"/></entry><entry><title>A Method for Assessing Cloud Adoption Risks</title><link href="https://www.sei.cmu.edu/blog/a-method-for-assessing-cloud-adoption-risks/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-05-09T00:00:00-04:00</published><updated>2022-05-09T00:00:00-04:00</updated><author><name>Christopher Alberts</name></author><id>https://www.sei.cmu.edu/blog/a-method-for-assessing-cloud-adoption-risks/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The move to a cloud environment provides significant benefits. Realizing these benefits, however, requires organizations to manage associated organizational and technical risks effectively.</summary></entry><entry><title>Operation Cloud Hopper Case Study</title><link href="https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-03-04T00:00:00-05:00</published><updated>2019-03-04T00:00:00-05:00</updated><author><name>Nathaniel Richmond</name></author><id>https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In December, a grand jury indicted members of the APT10 group for a tactical campaign known as Operation Cloud Hopper, a global series of sustained attacks against managed service providers and, subsequently, their clients....</summary><category term="Cloud Computing"/><category term="Software and Information Assurance"/></entry><entry><title>Deep Learning, Agile-DevOps, and Cloud Security: The Top 10 Blog Posts of 2018</title><link href="https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-01-07T00:00:00-05:00</published><updated>2019-01-07T00:00:00-05:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/deep-learning-agile-devops-and-cloud-security-the-top-10-blog-posts-of-2018/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This year's top 10, which features posts published between January 1, 2018, and December 31, 2018....</summary><category term="Autonomy and Counter-Autonomy"/><category term="Cloud Computing"/><category term="Data Modeling and Analytics"/><category term="Mission Assurance"/><category term="Software and Information Assurance"/></entry><entry><title>Best Practices for Cloud Security</title><link href="https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-03-12T00:00:00-04:00</published><updated>2018-03-12T00:00:00-04:00</updated><author><name>Donald Faatz</name></author><id>https://www.sei.cmu.edu/blog/best-practices-for-cloud-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">As detailed in last week's post, SEI researchers recently identified a collection of vulnerabilities and risks faced by organizations moving data and applications to the cloud....</summary><category term="Best Practices in Network Security"/><category term="Cloud Computing"/><category term="Human-Machine Interactions"/></entry><entry><title>12 Risks, Threats, &amp; Vulnerabilities in Moving to the Cloud</title><link href="https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-03-05T00:00:00-05:00</published><updated>2018-03-05T00:00:00-05:00</updated><author><name>Timothy Morrow</name></author><id>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Organizations continue to develop new applications in or migrate existing applications to cloud-based services. The federal government recently made cloud-adoption a central tenet of its IT modernization strategy....</summary><category term="Network Situational Awareness"/><category term="Best Practices in Network Security"/><category term="Cloud Computing"/><category term="Situational Awareness"/></entry><entry><title>Head in the Clouds</title><link href="https://www.sei.cmu.edu/blog/head-in-the-clouds/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2018-02-14T00:00:00-05:00</published><updated>2018-02-14T00:00:00-05:00</updated><author><name>Matthew Butkovic</name></author><id>https://www.sei.cmu.edu/blog/head-in-the-clouds/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The transition from on-premises information systems to cloud services represents a significant, and sometimes uncomfortable, new way of working for organizations....</summary><category term="Mission Assurance"/><category term="Insider Threat"/><category term="Cloud Computing"/></entry><entry><title>Establishing Trust in Disconnected Environments</title><link href="https://www.sei.cmu.edu/blog/establishing-trust-in-disconnected-environments/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2017-02-27T00:00:00-05:00</published><updated>2017-02-27T00:00:00-05:00</updated><author><name>Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/establishing-trust-in-disconnected-environments/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post explores techniques for establishing and maintaining trust in disconnected or intermittent network environments.</summary><category term="Software and Information Assurance"/><category term="Mission Assurance"/><category term="Cloud Computing"/></entry><entry><title>Tactical Cloudlets: Moving Cloud Computing to the Edge</title><link href="https://www.sei.cmu.edu/blog/tactical-cloudlets-moving-cloud-computing-to-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2014-11-10T00:00:00-05:00</published><updated>2014-11-10T00:00:00-05:00</updated><author><name>Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/tactical-cloudlets-moving-cloud-computing-to-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post is part of a series that explores the use of tactical cloudlets as a strategy for providing infrastructure to support computation offload.</summary><category term="Cloud Computing"/></entry><entry><title>The Latest Research from the SEI</title><link href="https://www.sei.cmu.edu/blog/latest-research-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2014-01-27T00:00:00-05:00</published><updated>2014-01-27T00:00:00-05:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/latest-research-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post provides a summary of recent research conducted at the SEI in areas including cybersecurity, software engineering, and AI.</summary><category term="Team Software Process (TSP)"/><category term="Insider Threat"/><category term="Cloud Computing"/><category term="System of Systems"/><category term="Software Architecture"/></entry><entry><title>Application Virtualization for Cloudlet-Based Cyber-Foraging at the Edge</title><link href="https://www.sei.cmu.edu/blog/application-virtualization-for-cloudlet-based-cyber-foraging-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2013-07-08T00:00:00-04:00</published><updated>2013-07-08T00:00:00-04:00</updated><author><name>Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/application-virtualization-for-cloudlet-based-cyber-foraging-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post discusses how application virtualization can enhance cloudlet-based cyber foraging at the edge and improve performance.</summary><category term="Cloud Computing"/></entry><entry><title>Standards in Cloud Computing Interoperability </title><link href="https://www.sei.cmu.edu/blog/standards-in-cloud-computing-interoperability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2013-03-04T00:00:00-05:00</published><updated>2013-03-04T00:00:00-05:00</updated><author><name>Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/standards-in-cloud-computing-interoperability/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In 2011, Col. Timothy Hill, director of the Futures Directorate within the Army Intelligence and Security Command, urged industry to take a more open-standards approach to cloud computing. "Interoperability between clouds, as well as the portability of files from one cloud to another, has been a sticking point in general adoption of cloud computing," Hill said during a panel at the AFCEA International 2011 Joint Warfighting Conference. Hill's view has been echoed by many in the cloud computing community, who believe that the absence of interoperability has become a barrier to adoption. This posting reports on recent research exploring the role of standards in cloud computing and offers recommendations for future standardization efforts....</summary><category term="Cloud Computing"/></entry><entry><title>Cloud Computing at the Tactical Edge</title><link href="https://www.sei.cmu.edu/blog/cloud-computing-at-the-tactical-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2011-11-14T00:00:00-05:00</published><updated>2011-11-14T00:00:00-05:00</updated><author><name>Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/cloud-computing-at-the-tactical-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Discover challenges and benefits of cloud computing at the tactical edge, providing insights into its implementation and potential impact in this SEI Blog.</summary><category term="Cloud Computing"/></entry><entry><title>Cloud Computing for the Battlefield</title><link href="https://www.sei.cmu.edu/blog/cloud-computing-for-the-battlefield/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2011-06-20T00:00:00-04:00</published><updated>2011-06-20T00:00:00-04:00</updated><author><name>Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/cloud-computing-for-the-battlefield/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post explores using cloudlets to increase processing capacity and conserve battery power by offloading computations from mobile devices.</summary><category term="Cloud Computing"/></entry></feed>