For the experienced information security professional, it seems that many of the principles that make cloud computing attractive run counter to network security best practices. Read the blog to learn how proper cloud security requires segmented business applications that use Zero Trust principles and centrally managed security deployments.