The widespread adoption of
cloud computing dramatically impacts the work of cybersecurity
analysts who must now understand how to gather, correlate, and
interpret information coming from many different cloud
sources. In this chapter, you'll learn about how cloud computing
impacts businesses and how you can perform threat
management in the cloud.