How threats shape cloud usage

September 26, 2014 Off By David

Grazed from Net-Security.org. Author: Mirko Zorz.

In this interview, Ravi Ithal, Chief Architect at Netskope, discusses the top threats to cloud security and how they are changing the way we’re using the cloud. He also talks about how the power of the cloud influences the agility of a modern security architecture and offers insight about who is ultimately responsible for data security in the cloud.

There’s no doubt, the cloud is here to stay. If you look at today’s fast paced threat landscape, what are the top threats to cloud security?

One of the biggest threats in cloud computing today is the data breach. There’s no doubt that we are on a cloud-data breach collision course as enterprises adopt cloud rapidly and data breaches grow in number and intensity. There are three ways that the cloud can impact data breaches:..

1. It can be an entry point, as we found in one of the services we track that was used to deliver malware.
2. It can become hacked, as we saw with code hosting service Code Spaces, where attackers gained access to its Amazon EC2 control panel to demand ransom and ultimately put the company out of business.
3. A corporate insider can intentionally or inadvertently expose sensitive data from a cloud service. This can range from a departing individual’s theft of business documents to the inadvertent sharing of customer records. Since one out of five enterprise cloud apps enables sharing, this can happen from nearly any type of service with nearly any type of data…

Read more from the source @ http://www.net-security.org/article.php?id=2133