Circle
Events
Blog

Download Publication

The Notorious Nine: Cloud Computing Top Threats in 2013
The Notorious Nine: Cloud Computing Top Threats in 2013

The Notorious Nine: Cloud Computing Top Threats in 2013

Release Date: 02/24/2013

Working Group: Top Threats

To manage risks in cloud computing, organizations must understand the nature of the security challenges they’re facing. CSA’s Top Threats Working Group provides organizations with an up-to-date, expert-informed understanding of cloud security threats through their top threats reports. Organizations can then make educated risk management decisions regarding cloud adoption strategies.

This is an old top threats report. Visit the Top Threat Working Group’s page here to find the most recent report.

Fill out this form to access this resource.

In my current job I work in:

Can we send you emails about other CSA projects?

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Our research is freely available in part thanks to the support of industry sponsors. Would you be willing to receive updates from them?

By opting into this agreement I am indicating that I want to receive email updates from CSA’s partners and sponsors on their projects/services. (Marketing purposes, Section 3 of the Privacy Policy).

Can we send you emails about other CSA projects?

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Download
Provide feedback on this form
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?