ChaptersEventsBlog

Download Publication

The Notorious Nine: Cloud Computing Top Threats in 2013
The Notorious Nine: Cloud Computing Top Threats in 2013

The Notorious Nine: Cloud Computing Top Threats in 2013

Release Date: 02/24/2013

Working Group: Top Threats

To manage risks in cloud computing, organizations must understand the nature of the security challenges they’re facing. CSA’s Top Threats Working Group provides organizations with an up-to-date, expert-informed understanding of cloud security threats through their top threats reports. Organizations can then make educated risk management decisions regarding cloud adoption strategies.

This is an old top threats report. Visit the Top Threat Working Group’s page here to find the most recent report.
Download this Resource

Bookmark
Share
Related resources
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Reflecting on the 2024 Microsoft Breach
Reflecting on the 2024 Microsoft Breach
Published: 09/15/2025
The Hidden Security Threats Lurking in Your Machine Learning Pipeline
The Hidden Security Threats Lurking in Your Machine Learning Pipeline
Published: 09/11/2025
A Successful SIM Swap Attack: Unpacking the 2022 FTX Hack
A Successful SIM Swap Attack: Unpacking the 2022 FTX Hack
Published: 09/02/2025
Looking Back on a Successful Social Engineering Attack: Retool 2023
Looking Back on a Successful Social Engineering Attack: Retool 2023
Published: 08/18/2025

Interested in helping develop research with CSA?

Related Certificates & Training