Cloud 101CircleEventsBlog
Join us at CSA's third annual Virtual Zero Trust Summit from November 20 - 21. Register now!

Download Publication

Top Threats to Cloud Computing Plus: Industry Insights
Top Threats to Cloud Computing Plus: Industry Insights

Top Threats to Cloud Computing Plus: Industry Insights

Release Date: 10/20/2017

Working Group: Top Threats

Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier document as wells as provides references and overviews of these incidents. In total, 21 anecdotes and examples are featured in the document. The references and overview of each anecdote and example are written with the help of publicly available information.
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
How CSA Research Uses the Cloud Controls Matrix to Address Diverse ...
Published: 10/25/2024
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security ...
Published: 10/21/2024
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
Published: 10/10/2024
Top Threat #3 - API-ocalypse: Securing the Insecure Interfaces
Top Threat #3 - API-ocalypse: Securing the Insecure Interfaces
Published: 10/09/2024

Acknowledgements

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Laurie Jameson Headshot Missing
Laurie Jameson

Laurie Jameson

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Scott Field Headshot Missing
Scott Field

Scott Field

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training