Avoid the risks of cloud abuse

Reduce the risks of malicious cloud attacks perpetrated through social media avenues

From the developerWorks archives

Judith Myerson

Date archived: November 29, 2016 | First published: April 22, 2013

Cloud abuse is among the top threats experts expect to see in 2013; one avenue that abuse can take is when cybercriminals use social media vehicles to abuse cloud environments — such as SaaS-oriented user access through accepted BYOD channels or PaaS-oriented access via Twitter interchanges used by a development team to communicate cloud administration updates. As this author has discussed before, many organizations employ a reactive response when the breach occurs instead of taking more prudent proactive steps. Join the author as she provides a roadmap for abuse mitigation and illustrates what proactive actions can be taken when abuse occurs.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Cloud computing, Mobile development
ArticleID=873009
ArticleTitle=Avoid the risks of cloud abuse
publish-date=04222013