While the cloud promises faster time to market and reduced costs, it also presents a new landscape for hackers to attack and achieve their goals — namely, to find and gain unauthorized access to data and information. Attackers follow the data they are after, and if that data is residing in the cloud, then they are going to start operating in the cloud as well. For many organizations, these recent events are a wake-up call to take a closer look at which cloud services are being used, by whom, and which actions are being performed within them.
The original article can be found here: http://www.ecommercetimes.com/story/80761.html?rss=1
Powered by WPeMatico