Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

6 Top Cloud Security Threats To Know About In 2019 (And Beyond)

From compromised credentials to misconfigured containers to the excessive use of privileged accounts, here's a look at six of the biggest cloud security threats technical experts are worried about this year.

Back 1 ... 4   5   6   7   Next

Excessive Use Of Privileged Accounts

Issues around privileged users get lifted and shifted from the existing on-premise environment into the cloud when companies migrate, according to Mike Sprunger, Insight Enterprises' senior manager of cloud and network security. But the stakes are higher, since privileged users have a greater scope of control in a cloud deployment since it's a wide-open platform, Sprunger said.

Having attribution around privileged accounts is vital, so Sprunger urged companies to stop allowing their employees to use shared accounts, especially if those accounts are privileged. And third-party vendors wanting admin-level privileges to support their customers is a problem in and of itself, Sprunger said.

Sprunger acknowledged that some third-parties need to have one-time access to the logs, if only for the purpose of performing audits. If third-parties are given elevated access, Sprunger said the business needs to watch what we're doing and keep an eye on the logging or auditing system to ensure there's no problem in the environment.

Back 1 ... 4   5   6   7   Next

sponsored resources