REPORTS
Strategy: How to Choose Multifactor Authentication

Download

Strategy: How Cybercriminals Attack the Cloud

Strategy: How to Choose Multifactor Authentication

How Cybercriminals Attack the Cloud

Cloud computing is constantly evolving and changing the way enterprises leverage technology. Regulatory compliance requirements will be a barrier preventing certain ­organizations from fully engaging in cloud activities, but for most, the potential for ­operational and capital cost savings will ensure that more and more data ends up in the cloud. The intensity and sophistication of attacks against data in the cloud will increase in line with the amount of data there.

Companies must invest in people with the technical skills necessary to understand and mitigate the security risks associated with cloud-based services. This may mean using a mix of cloud computing models to meet security, compliance and performance requirements. Outages will always be a concern, and contingency plans have to be comprehensive and well-rehearsed to preserve uptime and provide workarounds in case of downtime. Although cloud services enable organizations to do more with less, security issues inherent in the hosting model have to be addressed.

In this Dark Reading report, we examine how the benefits of cloud computing compare with the security risks, explain how and why hackers are increasingly targeting cloud-based systems, and provide recommendations for what enterprise security pros can do in an environment in which they lack ultimate control. (S6870413)


 

Download
Table of Contents