{"id":5154,"date":"2012-12-18T18:15:00","date_gmt":"2012-12-18T18:15:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2487844"},"modified":"2012-12-18T18:15:00","modified_gmt":"2012-12-18T18:15:00","slug":"understanding-cloud-vulnerabilities","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/understanding-cloud-vulnerabilities\/","title":{"rendered":"Understanding Cloud Vulnerabilities"},"content":{"rendered":"<p>It isn\u2019t so much that cloud computing solutions are more vulnerable than traditional solutions; rather, cloud vulnerabilities take a much different form (and can occur on a much wider scale) than traditional security vulnerabilities.<br \/>\nUp to this point, most of the major issues with cloud providers have had more to do with outages rather than data breaches. That doesn\u2019t mean there are no risks in the cloud, but that the form of cloud attacks may be different than traditional attacks.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2487844\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It isn\u2019t so much that cloud computing solutions are more vulnerable than traditional solutions; rather, cloud vulnerabilities take a much different form (and can occur on a much wider scale) than traditional security vulnerabilities.<br \/>\nUp to this point&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-5154","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/5154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=5154"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/5154\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=5154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=5154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=5154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}