Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Download Publication

The Notorious Nine: Cloud Computing Top Threats in 2013
The Notorious Nine: Cloud Computing Top Threats in 2013

The Notorious Nine: Cloud Computing Top Threats in 2013

Release Date: 02/24/2013

Working Group: Top Threats

To manage risks in cloud computing, organizations must understand the nature of the security challenges they’re facing. CSA’s Top Threats Working Group provides organizations with an up-to-date, expert-informed understanding of cloud security threats through their top threats reports. Organizations can then make educated risk management decisions regarding cloud adoption strategies.

This is an old top threats report. Visit the Top Threat Working Group’s page here to find the most recent report.
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
Decoding the Volt Typhoon Attacks: In-Depth Analysis and Defense Strategies
Decoding the Volt Typhoon Attacks: In-Depth Analysis and Defense St...
Published: 12/17/2024
Top Threat #7 - Data Disclosure Disasters and How to Dodge Them
Top Threat #7 - Data Disclosure Disasters and How to Dodge Them
Published: 12/16/2024
Level Up Your Cloud Security Skills With This Jam-Packed Training Bundle
Level Up Your Cloud Security Skills With This Jam-Packed Training B...
Published: 12/11/2024
Top Threat #6 - Code Confusion: The Quest for Secure Software Development
Top Threat #6 - Code Confusion: The Quest for Secure Software Devel...
Published: 12/02/2024

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Luciano (J.R.) Santos
Luciano (J.R.) Santos
Chief Customer Officer, CSA

Luciano (J.R.) Santos

Chief Customer Officer, CSA

J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...

Read more

Kendall Scoboria Headshot Missing
Kendall Scoboria

Kendall Scoboria

Evan Scoboria Headshot Missing
Evan Scoboria
Technology Director, CSA

Evan Scoboria

Technology Director, CSA

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

Alex Ginsburg Headshot Missing
Alex Ginsburg

Alex Ginsburg

Rafal Los Headshot Missing
Rafal Los

Rafal Los

Bryan Sullivan Headshot Missing
Bryan Sullivan

Bryan Sullivan

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training