<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/cloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/cloud/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Wed, 25 Mar 2026 23:44:26 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Cloud Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/cloud/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Penetration Testing in Cloud Migrations</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-in-cloud-migrations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-in-cloud-migrations</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 21 Oct 2024 16:21:16 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Cloud Migration]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8873</guid>

					<description><![CDATA[Migrating to the cloud has become essential for modern businesses, offering scalability, flexibility, and cost savings. However, it comes with its own risks. Ensuring that security remains robust during and after cloud migrations is critical, and one of the best ways to do that is through penetration testing. In this article, we’ll explore the importance [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cloud Environments Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/cloud-environments-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cloud-environments-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 04:31:10 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cloud Environments]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[ethical hacking sydney]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8297</guid>

					<description><![CDATA[Introduction In the evolving landscape of digital technology, cloud computing has become a cornerstone. Businesses of all sizes are moving to cloud environments for their flexibility, scalability, and cost-effectiveness. However, with these benefits come significant security challenges. Penetration testing for cloud environments is crucial to address these challenges. This process involves simulating cyber attacks to [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cloud Security Posture Management (CSPM) in Pen Testing</title>
		<link>https://www.vertexcybersecurity.com.au/cloud-security-posture-management-cspm-in-pen-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cloud-security-posture-management-cspm-in-pen-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 31 May 2024 04:15:57 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cloud posture management]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[CSPM]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8201</guid>

					<description><![CDATA[Introduction In today&#8217;s digital landscape, cloud computing is integral for businesses. This shift introduces new security challenges, making Cloud Security Posture Management (CSPM) essential. CSPM tools identify and address security risks in cloud environments, enhancing overall security. Integrating CSPM testing into penetration testing is crucial to safeguard cloud infrastructures. This blog delves into CSPM testing [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>TLS1.2 End of Life</title>
		<link>https://www.vertexcybersecurity.com.au/tls1-2-end-of-life/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tls1-2-end-of-life</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 21 Feb 2023 03:20:34 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[data in transit]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End of life]]></category>
		<category><![CDATA[EOL]]></category>
		<category><![CDATA[http]]></category>
		<category><![CDATA[tls]]></category>
		<category><![CDATA[TLS1.2]]></category>
		<category><![CDATA[TLS1.2 End of life]]></category>
		<category><![CDATA[TLS1.2 EOL]]></category>
		<category><![CDATA[TLS1.2 Expiry]]></category>
		<category><![CDATA[TLS1.3]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5221</guid>

					<description><![CDATA[SSL (Secure Sockets Layer) / TLS (Transport Layer Security) was developed to make the HTTP secure, aka as HTTPS (Hypertext transfer protocol secure) and has changed over time to adapt to the newer encryption methods and latest encryption attacks. The current mainstream version TLS 1.2, was published in 2008 so when does it expire or [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Is it necessary to penetration test a website hosted on the cloud?</title>
		<link>https://www.vertexcybersecurity.com.au/is-it-necessary-to-penetration-test-a-website-hosted-on-the-cloud/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-it-necessary-to-penetration-test-a-website-hosted-on-the-cloud</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 07 Sep 2022 06:41:53 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4645</guid>

					<description><![CDATA[Cloud hosting (such as with AWS, Azure Cloud, etc) is relatively new, and has quickly superseded traditional methods of website hosting. But how is cloud hosting different? Are there security advantages? And is penetration testing still necessary? Prior to cloud hosting, there were two primary methods for hosting a website &#8211; maintaining a physical server, [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
