In this collection, learn how to protect information, data, applications and infrastructure associated with cloud computing to effectively secure business-critical data in the cloud.