Security

What are the 12 biggest cloud computing security threats?

Share this post:

A close-up on an abstract design of a display, which is warning about a cyber attack. Multiple rows of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, etc...

The cloud is growing rapidly and new services are emerging seemingly daily. That’s great news for enterprises who want to achieve goals more quickly and easily than they have in the past, but it also makes security something of a moving target.

IBM is staying on top of cloud security with numerous options to reduce risk, but it’s still worthwhile for enterprises to be aware of the biggest threats that are out there. According to a report from the Cloud Security Alliance released February 29, here are the 12 biggest threats right now:

  • Data breaches
  • Weak identity, credential and access management
  • Insecure interfaces and APIs
  • System and application vulnerability
  • Account hijacking
  • Malicious insiders
  • Advanced persistent threats
  • Data loss
  • Insufficient due diligence
  • Abuse and nefarious use of cloud services
  • Denial of service
  • Shared technology issues

For more information about these threats, check out Information Management’s slideshow detailing CSA’s report.

More Security stories

Asteria builds liquidity management solution for SMBs on IBM Cloud

Small businesses operating with lean teams face many challenges, including being distracted by paperwork and planning. These tasks are necessary, but shift focus away from the actual work of the business. Company owners might worry about questions such as What products will sell next month? When will I receive my payments? Do I have enough […]

Continue reading

Chatmantics improves customer experiences by replacing call center IVR with AI on IBM Cloud

We’ve all called a company’s customer service number only to be greeted by an interactive voice response (IVR) system. The IVR will say to press one for this and two for that and so on. You must wait for the correct number to enter your account information “so that we may better serve you” but […]

Continue reading

Comprehensive strategy for enterprise cloud: Where power meets flexibility

Enterprises have embraced the cloud: according to the 2018 IDG Cloud Computing study, 73 percent of enterprises surveyed now host at least a portion of their enterprise computing infrastructure on the cloud, and many have lifted and shifted their simplest workloads to the cloud. But recent survey data also reveals multiple concerns about security, vendor […]

Continue reading