Remove 2006 Remove Cloud Migration Remove Data breaches Remove Social Engineering
article thumbnail

Using Cloud Securely?—?The Config Doom Question

Anton on Security

At this point, it is clear that most discussions on using cloud securely or secure use of cloud computing include the dreaded configuration question — or, rather, a misconfiguration one. According to most industry reports , a vast majority of cloud security incidents and data breaches stem from misconfigurations.

article thumbnail

Using Cloud Securely?—?The Config Doom Question

Security Boulevard

At this point, it is clear that most discussions on using cloud securely or secure use of cloud computing include the dreaded configuration question — or, rather, a misconfiguration one. According to most industry reports , a vast majority of cloud security incidents and data breaches stem from misconfigurations.