Lee Newcombe

Lee Newcombe

Rotherham, England, United Kingdom
1K followers 500+ connections

Articles by Lee

  • On architecture, security architecture, and, yes, a little bit of AI.

    I (successfully) took the bridge exam to became TOGAF10 certified last week, some 15 years after I did the same for…

    5 Comments
  • Agentic AI Security - Toxic Agent Flows

    I saw a really interesting and well-written explanation of an attack via agentic AI using toxic agent flows from…

    6 Comments
  • CSA UK call for Volunteers

    Any of my contacts interested in participating and/or leading research projects in the area of Cloud Computing security…

    10 Comments

Activity

Join now to see all activity

Publications

  • Securing Cloud Services - 2nd Edition

    IT Governance Publishing

    The 2nd Edition of Securing Cloud Services is a fundamental re-write of the first edition, reflecting the massive changes to the cloud computing landscape since 2012. The second edition adopts a similar structure but with much more focus on the native capabilities of the hyperscale providers and addition of consideration of newer approaches such as Function as a Service.

    See publication
  • Securing Cloud Services: A pragmatic approach to security architecture in the Cloud

    IT Governance Publishing

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.



    Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS) and deployment models (public, private, community and hybrid) as defined by NIST. It outlines the common benefits, and describes some of the potential pitfalls of, and threats…

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.



    Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS) and deployment models (public, private, community and hybrid) as defined by NIST. It outlines the common benefits, and describes some of the potential pitfalls of, and threats associated with, Cloud Computing.


    Part 2 outlines security architecture concepts and describes how they relate to Cloud Computing. It uses a conceptual security reference model (SRM) to define a set of common security services and explains how they can be delivered across the various service models in order to secure a Cloud service.



    Part 3 ­provides conclusions, and speculates on the future of Cloud Computing.

    See publication

Recommendations received

More activity by Lee

View Lee’s full profile

  • See who you know in common
  • Get introduced
  • Contact Lee directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses