Avoid the risks of cloud abuse
Reduce the risks of malicious cloud attacks perpetrated through social media avenues
From the developerWorks archives
Date archived: November 29, 2016 | First published: April 22, 2013
Cloud abuse is among the top threats experts expect to see in 2013; one avenue that abuse can take is when cybercriminals use social media vehicles to abuse cloud environments — such as SaaS-oriented user access through accepted BYOD channels or PaaS-oriented access via Twitter interchanges used by a development team to communicate cloud administration updates. As this author has discussed before, many organizations employ a reactive response when the breach occurs instead of taking more prudent proactive steps. Join the author as she provides a roadmap for abuse mitigation and illustrates what proactive actions can be taken when abuse occurs.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.