
Sign up to save your podcasts
Or


The cloud has become a significant target for cyberattacks, and these attacks increased by 95% from 2022 to 2023, with a whopping 288% rise in cases where attackers directly target the cloud. To protect the cloud environment, users need to understand how these attackers work – how they break in, move around, what they are after, and how they avoid getting caught.
The High Stakes of Cloud Misconfigurations
A security breach in the cloud can expose a treasure trove of sensitive information, including personal data, financial records, intellectual property, and closely secured trade secrets. The primary concern is the speed at which attackers can move through cloud environments, often undetected, to locate and exfiltrate this valuable data. Unlike on-premises environments, where attackers must deploy external tools that increase their risk of detection, cloud-native tools within the environment expedite the process for threat actors. As a result, the need for proper cloud security is paramount to prevent breaches that can inflict lasting damage on an organization’s reputation and bottom line.
By InfosecTrain3.7
33 ratings
The cloud has become a significant target for cyberattacks, and these attacks increased by 95% from 2022 to 2023, with a whopping 288% rise in cases where attackers directly target the cloud. To protect the cloud environment, users need to understand how these attackers work – how they break in, move around, what they are after, and how they avoid getting caught.
The High Stakes of Cloud Misconfigurations
A security breach in the cloud can expose a treasure trove of sensitive information, including personal data, financial records, intellectual property, and closely secured trade secrets. The primary concern is the speed at which attackers can move through cloud environments, often undetected, to locate and exfiltrate this valuable data. Unlike on-premises environments, where attackers must deploy external tools that increase their risk of detection, cloud-native tools within the environment expedite the process for threat actors. As a result, the need for proper cloud security is paramount to prevent breaches that can inflict lasting damage on an organization’s reputation and bottom line.

649 Listeners

1,027 Listeners

178 Listeners

3 Listeners