![The Edge Logo The Edge Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
New Brand of Security Threats Surface in the Cloud
Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.
![Cover page of The Promise and Reality of Cloud Security report. Cover page of The Promise and Reality of Cloud Security report.](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2af82f24a3f4c843/64f1599be68ad335905ab246/cloudsecreport-crop.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Cloud services are facing their first real security litmus test since the pandemic's 2020 arrival accelerated cloud adoption. A new category of security flaws and risks in cloud services since has emerged, raising the stakes for providers and adopters alike.
Thankfully cyberattacks targeting the cloud remain rare so far, with mainly cryptojacking campaigns exploiting misconfigured cloud-account settings in order to siphon computing power for monetization. But with security researchers now regularly unearthing new security flaws and weak default security settings in some of the biggest cloud provider services, it's only a matter of time when the attacks become more disruptive and destructive.
Cloud-specific security tools such as cloud workload protection platforms (CWPP) for detection and response and cloud security posture management (CSPM) for proactive security are emerging and maturing, as are the security features and functions cloud providers such as Amazon and Microsoft now include in their services.
A newly published report co-authored by Black Hat, Dark Reading, and Omdia, called "The Promise and Reality of Cloud Security," examines the key challenges — and opportunities — for securing cloud services and accounts.
Read the full (free) report, which draws from Black Hat research, Dark Reading reporting, and Omdia research and analysis.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024