7 top cloud security threats — and how to address them
- by nlqip
7. Data exfiltration
Frequently overlooked, data exfiltration is a significant cloud security threat. “Data exfiltration refers to the electronic transmission of data from a cloud environment to an unauthorized external location,” says John Henley, principal consultant at technology research and advisory firm ISG. “This could occur in several ways, including the exploitation of a vulnerability, misconfigurations, or compromised credentials.”
Data exfiltration can lead to the theft of sensitive information, such as personal identity data, financial information, intellectual property, or confidential corporate data. “The consequences of data exfiltration on monitoring, remediation, and legal actions can be long-term and far-reaching,” Henley warns.
Antagonists may use stolen intellectual property or trade secrets to gain a competitive advantage that leads to future market-share erosion or the ability to dominate a market. Meanwhile, operational disruption can result in downtime, lost productivity, and costs incurred to rebuild operations.
Source link
lol
7. Data exfiltration Frequently overlooked, data exfiltration is a significant cloud security threat. “Data exfiltration refers to the electronic transmission of data from a cloud environment to an unauthorized external location,” says John Henley, principal consultant at technology research and advisory firm ISG. “This could occur in several ways, including the exploitation of a vulnerability,…
Recent Posts
- Everything That You Need to Know About the Dark Web and Cybercrime | BlackFog
- Security plugin flaw in millions of WordPress sites gives admin access
- Phishing emails increasingly use SVG attachments to evade detection
- Fake AI video generators infect Windows, macOS with infostealers
- T-Mobile confirms it was hacked in recent wave of telecom breaches