{"id":2723,"date":"2012-07-18T19:33:00","date_gmt":"2012-07-18T19:33:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2315381"},"modified":"2012-07-18T19:33:00","modified_gmt":"2012-07-18T19:33:00","slug":"best-practices-in-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/best-practices-in-cloud-security\/","title":{"rendered":"Best Practices in Cloud Security"},"content":{"rendered":"<p>Last week one news item that attracted media attention was the hacking of some nearly 450,000 passwords from Yahoo Service called \u2018Yahoo Voice&#8217;. The communications on the incident state that, SQL Injection is the primary technique adopted by hackers to get the information out of databases and publish them.<br \/>\nAs per further communications, we find the affected company taking more precautions to ensure that security is their highest priority. These events will also generally shake the Cloud Adoption at the enterprise level, where always the Fear, Uncertainty and Doubt in the minds of CIOs may increase due to these incidents.<br \/>\nHowever the following are the best practices and guidelines that should be adopted by any enterprise when adopting hybrid cloud computing and a one-off incident should not dampen their road map to hybrid computing adoption.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2315381\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week one news item that attracted media attention was the hacking of some nearly 450,000 passwords from Yahoo Service called \u2018Yahoo Voice&#8217;. The communications on the incident state that, SQL Injection is the primary technique adopted by hackers &#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2723","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=2723"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2723\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=2723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=2723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=2723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}