Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom Dell Technologies World Digital Experience 2020 HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

12 Biggest Cloud Threats And Vulnerabilities In 2020

From misconfigured storage buckets and excess privileges to Infrastructure as Code (IoC) templates and automated attacks, here’s a look at 12 of the biggest cloud threats technical experts are worried about this year.

Back 1 ... 2   3   4   5   6   ... 13 Next
photo

10. Interconnectivity Of Cloud Functions

Many organizations don’t understand the basics of how to configure and harden cloud technologies as well as how cloud services interact with one another, according to Sam Bisbee, chief security officer at Threat Stack. Virtual machines are increasingly considered users in the context of a cloud environment and are therefore leveraging APIs from public cloud vendors to request keys and change infrastructure.

Therefore, if an organization has a compromise, Bisbee said the attacker can make a network call and start controlling the infrastructure. The interplay between networked services is something that most teams aren’t prepared to deal with, according to Bisbee.

For businesses deploying Kubernetes for the first time, Bisbee recommended using Amazon Elastic Kubernetes Service (EKS) since it shifts responsibility for the integrity and responsibility of the data to AWS and only requires the customer to learn a small amount about maintenance. Bisbee said securing a container deployment on one’s own is a non-trivial task.

 
 
Back 1 ... 2   3   4   5   6   ... 13 Next

sponsored resources