Download Publication

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016
‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Release Date: 02/29/2016

“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies. The report reflects the current consensus among security experts in the CSA community about the most significant security issues in the cloud.


You can view the latest version of this report here

Related Research | Working Group | Related Training

Help CSA better understand how we can support the cloud community. Answer a couple of questions to download this resource.

In my current job I work in:

CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Our research is freely available in part thanks to the support of industry sponsors. Would you be willing to receive updates from them?

By opting into this agreement I am indicating that I want to receive email updates from CSA’s partners and sponsors on their projects/services. (Marketing purposes, Section 3 of the Privacy Policy).

You’ve made safer cloud computing possible.

Download

CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Download