{"id":6159,"date":"2013-02-27T16:22:36","date_gmt":"2013-02-27T16:22:36","guid":{"rendered":"http:\/\/cloudnewsdaily.com\/?p=14319"},"modified":"2013-02-27T16:22:36","modified_gmt":"2013-02-27T16:22:36","slug":"do-you-know-the-top-threats-to-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/do-you-know-the-top-threats-to-cloud-security\/","title":{"rendered":"Do You Know the Top Threats to Cloud Security?"},"content":{"rendered":"<\/p>\n<p>Where computing goes, trouble follows &#8212; in the form of hackers, disgruntled employees, and plain old destructive bugs. And as computing is moving to the Cloud (it says so right there in our logo!) that&#8217;s where some of the newest threats are emerging.<\/p>\n<p>The Cloud Security Alliance has identified <a href=\"https:\/\/cloudsecurityalliance.org\/download\/the-notorious-nine-cloud-computing-top-threats-in-2013\/\">The Notorious Nine<\/a>, (<em>registration required<\/em>) the top nine cloud computing threats for 2013.<\/p>\n<p>Data breaches, data loss, account and traffic hijacking, insecure interfaces and APIs, denial of service attacks, malicious insiders, cloud &#8220;abuse&#8221; (using the power of the cloud to crack passwords), lack of due diligence, and shared technology platforms leading to shared vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"zemanta-pixie\" style=\"margin-top: 10px; height: 15px;\"><img decoding=\"async\" class=\"zemanta-pixie-img\" style=\"border: none; float: right;\" src=\"http:\/\/img.zemanta.com\/pixy.gif?x-id=195a24a9-a156-4198-9fd9-f3a5d5df635c\" alt=\"\" \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/CloudNewsDaily\/~4\/lSNHZCRz7Cw\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Where computing goes, trouble follows &#8212; in the form of hackers, disgruntled employees, and plain old destructive bugs. And as computing is moving to the Cloud (it says so right there in our logo!) that&#8217;s where some of the newest threats are emerging. The Cloud Security Alliance has identified The Notorious Nine, (registration required) the [&#8230;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[442,849,1486,1487,1488,1297,73],"tags":[118],"class_list":["post-6159","post","type-post","status-publish","format-standard","hentry","category-application-programming-interface","category-cloud-security-alliance","category-data-loss","category-denial-of-service-attack","category-notorious-nine","category-opinion","category-research","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=6159"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6159\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=6159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=6159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=6159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}