Security

What are the 12 biggest cloud computing security threats?

Share this post:

A close-up on an abstract design of a display, which is warning about a cyber attack. Multiple rows of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, etc...

The cloud is growing rapidly and new services are emerging seemingly daily. That’s great news for enterprises who want to achieve goals more quickly and easily than they have in the past, but it also makes security something of a moving target.

IBM is staying on top of cloud security with numerous options to reduce risk, but it’s still worthwhile for enterprises to be aware of the biggest threats that are out there. According to a report from the Cloud Security Alliance released February 29, here are the 12 biggest threats right now:

  • Data breaches
  • Weak identity, credential and access management
  • Insecure interfaces and APIs
  • System and application vulnerability
  • Account hijacking
  • Malicious insiders
  • Advanced persistent threats
  • Data loss
  • Insufficient due diligence
  • Abuse and nefarious use of cloud services
  • Denial of service
  • Shared technology issues

For more information about these threats, check out Information Management’s slideshow detailing CSA’s report.

More Security stories

5 data security techniques that help boost consumer confidence

These days, it seems like hardly any time passes between headlines about the most recent data breach. Consider the revelation in late September that a security intrusion exposed the accounts of more than 50 million Facebook users. For that matter, not much time goes by without a new survey or study that confirms the difficulty of […]

Continue reading

Machine learning: A key weapon in the cybersecurity battle

Since the dawn of the internet, companies have been fighting to stay ahead of cybercriminals. Artificial intelligence (AI) and machine learning have made this job easier by automating complex processes for detecting attacks and reacting to breaches. However, cybercriminals are also using this technology for their own malicious purposes. More and more hackers are exploiting […]

Continue reading

Merlin uses IBM Cloud Garage to fast-track new cybersecurity technology

The cybersecurity marketplace is crowded. There are hundreds of vendors with an amazing array of solutions flooding the space, yet many organizations still struggle to stay ahead. In many companies, everyone is working as hard as they can to plug holes, but there is still a lack of knowledge about how to manage and understand […]

Continue reading