<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>amazonblogstore.com &#187; Cloud Computing Security</title>
	<atom:link href="http://amazonblogstore.com/tag/cloud-computing-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://amazonblogstore.com</link>
	<description>Just another WordPress site</description>
	<lastBuildDate>Wed, 07 Dec 2016 09:02:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>Journey Through the Cloud &#8211;  Security Best Practices</title>
		<link>http://amazonblogstore.com/journey-through-the-cloud-security-best-practices/</link>
		<comments>http://amazonblogstore.com/journey-through-the-cloud-security-best-practices/#comments</comments>
		<pubDate>Wed, 23 Sep 2015 08:06:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Amazon Customer Service Videos]]></category>
		<category><![CDATA[Amazon Web Services (Website)]]></category>
		<category><![CDATA[Cloud Computing (Industry)]]></category>
		<category><![CDATA[Cloud Computing Security]]></category>

		<guid isPermaLink="false">http://amazonblogstore.com/journey-through-the-cloud-security-best-practices/</guid>
		<description><![CDATA[AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organization&#8217;s security and compliance objectives. View the slides from ...]]></description>
				<content:encoded><![CDATA[<div itemscope itemtype='http://schema.org/VideoObject'>
<meta itemprop='name' content="Journey Through the Cloud -  Security Best Practices"><meta itemprop='thumbnailURL' content='https://i.ytimg.com/vi/rXPyGDWKHIo/hqdefault.jpg'><meta itemprop='embedURL' content='https://www.youtube.com/watch?v=rXPyGDWKHIo'><meta itemprop='width' content='640'><meta itemprop='height' content='480'><meta itemprop='duration' content='T00H56M46S'></p>
<p style='text-align:center;'><iframe width="640" height="360" src="https://www.youtube.com/embed/rXPyGDWKHIo?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p><span itemprop='description'>AWS provides a range of security services and features that AWS customers can use to secure their content and applications and meet their own specific business requirements for security. This presentation focuses on how you can make use of AWS security features to meet your own organization&#8217;s security and compliance objectives.</p>
<p>View the slides from this webinar based on Slideshare here: http://www.slideshare.net/AmazonWebServices/journey-through-the-cloud-security-best-practices-52501474</p>
<p>Masterclass series webinars: http://aws.amazon.com/campaigns/emea/masterclass/</p>
<p>Journey Through the Cloud series webinars: http://aws.amazon.com/campaigns/emea/journey/</span></p>
</div>
]]></content:encoded>
			<wfw:commentRss>http://amazonblogstore.com/journey-through-the-cloud-security-best-practices/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
