Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation
Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation

Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation

Release Date: 02/07/2022

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In this sixth installment, we surveyed 703 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results and its expertise to create the 2022 Top Cloud Threats report - the ‘Pandemic Eleven’.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Published: 04/12/2024
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Published: 04/10/2024
Why Cyber Defenders Should Embrace a Hacker Mindset
Why Cyber Defenders Should Embrace a Hacker Mindset
Published: 04/10/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training