{"id":4321,"date":"2025-03-18T18:16:17","date_gmt":"2025-03-18T09:16:17","guid":{"rendered":"https:\/\/aireviewirush.com\/?p=4321"},"modified":"2025-03-18T18:16:17","modified_gmt":"2025-03-18T09:16:17","slug":"10-real-life-cloud-safety-failures-and-what-we-are-able-to-be-taught-from-them","status":"publish","type":"post","link":"https:\/\/aireviewirush.com\/?p=4321","title":{"rendered":"10 real-life cloud safety failures and what we are able to be taught from them"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>As organisations more and more migrate to the cloud, securing delicate information has by no means been extra essential. Whereas cloud computing affords flexibility and scalability, it additionally opens the door to a variety of safety dangers.\u00a0<\/p>\n<p>From easy misconfigurations to advanced insider threats, cloud safety breaches have value firms large sums of cash and compromised hundreds of thousands of customers\u2019 personal data. On this article, we discover 10 high-profile cloud safety failures, each offering an important lesson within the significance of strong safety practices. These real-life incidents function cautionary tales for companies counting on cloud providers, providing key takeaways to assist stop the subsequent main breach.\u00a0<\/p>\n<p>Right here\u2019s what went flawed, what may have been achieved in another way and the way firms can fortify their defences towards the ever-evolving panorama of cloud safety threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\" role=\"button\"><label for=\"item-69e67ba6adfb4\" ><span class=\"\"><span style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input aria-label=\"Toggle\" aria-label=\"item-69e67ba6adfb4\"  type=\"checkbox\" id=\"item-69e67ba6adfb4\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#1_Dropbox_2012\" title=\"1. Dropbox (2012)\">1. Dropbox (2012)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#2_Snapchat_2014\" title=\"2. Snapchat (2014)\">2. Snapchat (2014)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#3_Uber_2016\" title=\"3. Uber (2016)\">3. Uber (2016)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#4_AWS_S3_Breach_2017\" title=\"4. AWS S3 Breach (2017)\">4. AWS S3 Breach (2017)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#5_Accenture_2017\" title=\"5. Accenture (2017)\">5. Accenture (2017)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#6_GitHub_2018\" title=\"6. GitHub (2018)\">6. GitHub (2018)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#7_Capital_One_2019\" title=\"7. Capital One (2019)\">7. Capital One (2019)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#8_Microsoft_2019\" title=\"8. Microsoft (2019)\">8. Microsoft (2019)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#9_Fb_2019\" title=\"9. Fb (2019)\">9. Fb (2019)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/aireviewirush.com\/?p=4321\/#10_Slack_2020\" title=\"10. Slack (2020)\">10. Slack (2020)<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Dropbox_2012\"><\/span><strong>1. Dropbox (2012)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: A hacker obtained Dropbox person credentials by a third-party breach and accessed customers\u2019 cloud-stored information, exposing hundreds of thousands of accounts.<\/p>\n<p><strong>Response<\/strong>: A Dropbox investigation decided that usernames and passwords stolen from different web sites have been used to sign up to \u201ca small quantity\u201d of Dropbox accounts. The corporate contacted these customers, providing to assist them defend their accounts.\u00a0<\/p>\n<p>Aditya Agarwal, then VP of engineering at Dropbox, stated: \u201cA stolen password was additionally used to entry an worker Dropbox account containing a undertaking doc with person e mail addresses. We consider this improper entry is what led to the spam.\u201d He added that Dropbox was placing further controls in place to assist be sure that there was no repeat of the problem.\u00a0<\/p>\n<p>The cloud storage agency opted to introduce two-factor authentication (2FA) and enhanced safety monitoring to stop future breaches. Later, in 2016, it was revealed that the breach had affected greater than 68 million person accounts. Dropbox prompted customers who hadn\u2019t modified their passwords since 2012 to take action as a precautionary measure.<\/p>\n<p><strong>Lesson<\/strong>: The significance of sturdy, multi-factor authentication (MFA) and monitoring for uncommon login exercise.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Snapchat_2014\"><\/span><strong>2. Snapchat (2014)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: Snapchat\u2019s cloud-based infrastructure was compromised on account of vulnerabilities in the best way it dealt with person information. Hackers exploited cloud programs and leaked hundreds of thousands of photographs.<\/p>\n<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash-1024x683.jpg\" alt=\"\" class=\"wp-image-104465 lazyload\" style=\"width:442px;height:auto\"><noscript><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash-1024x683.jpg\" alt=\"\" class=\"wp-image-104465 lazyload\" style=\"width:442px;height:auto\" srcset=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash-1024x683.jpg 1024w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash-300x200.jpg 300w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash-768x512.jpg 768w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash-1536x1024.jpg 1536w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/souvik-banerjee-PQXlYuQeX4c-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\"><\/noscript><\/figure>\n<p><strong>Response: <\/strong>On this information leak, also known as \u201cThe Snappening, Snapchat itself was indirectly hacked. As an alternative, third-party apps that saved Snapchat photographs have been compromised. A spokesperson for the corporate stated: \u201cSnapchatters have been victimised by their use of third-party apps to ship and obtain Snaps.\u00a0<\/p>\n<p>We expressly prohibit third-party apps that entry our service, as they compromise customers\u2019 safety.\u201d Snapchat warned customers towards third-party apps and improved its safety insurance policies to assist stop unauthorised entry.<\/p>\n<p><strong>Lesson<\/strong>: Correct safety measures for person information and picture dealing with in cloud storage can stop mass information leaks.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Uber_2016\"><\/span><strong>3. Uber (2016)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: Hackers accessed Uber\u2019s cloud-based storage and obtained private information of 57 million customers and drivers. Uber initially did not report the breach.<\/p>\n<p><strong>Response: <\/strong>Uber executives finally commented on the breach in 2017, however solely after it had been made public. The transportation agency confirmed that 57 million accounts have been compromised, together with names, e mail addresses and telephone numbers of customers and drivers. As an alternative of reporting the breach on the time, Uber paid the hackers $100,000 below the guise of a bug bounty to delete the information and stay silent.\u00a0<\/p>\n<p>In November 2017, Dara Khosrowshahi, who grew to become Uber\u2019s CEO after the breach, admitted Uber\u2019s failure to reveal the incident sooner. He stated: \u201cNone of this could have occurred, and I cannot make excuses for it. We&#8217;re altering the best way we do enterprise. We&#8217;re taking steps to make sure that we do the suitable factor going ahead.\u201d<\/p>\n<p>Joe Sullivan, Uber\u2019s CSO in the course of the breach, was later fired and charged with masking up the hack. Prosecutors accused him of obstructing justice by misclassifying the breach as a bug bounty cost. Throughout his 2022 trial, Sullivan defended his actions, stating: \u201cI used to be following the processes that have been in place at Uber on the time.\u201d\u00a0<\/p>\n<p>Nonetheless, he was discovered responsible of obstructing justice, marking the primary time a safety govt was convicted for mishandling an information breach. After this scandal, Uber strengthened its safety insurance policies and reached a $148m settlement for failing to reveal the breach.<\/p>\n<p><strong>Lesson<\/strong>: Recurrently monitor and safe cloud storage, implement strict entry management, and guarantee correct incident response protocols.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_AWS_S3_Breach_2017\"><\/span><strong>4. AWS S3 Breach (2017)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: An enormous information leak occurred when firms mistakenly left AWS S3 buckets publicly accessible. This uncovered delicate information equivalent to buyer data, inside enterprise paperwork, and personal communications.<\/p>\n<p><strong>Response: <\/strong><a href=\"https:\/\/aws.amazon.com\/blogs\/security\/\" target=\"_blank\" rel=\"noopener\">AWS<\/a> emphasised that the breaches weren&#8217;t on account of vulnerabilities in AWS itself, however somewhat misconfigurations by clients who inadvertently left their S3 storage buckets publicly accessible.\u00a0<\/p>\n<p>The cloud computing supplier issued an announcement clarifying that these breaches have been the results of person error, explaining: \u201cAmazon S3 is safe by default, and bucket entry is managed by the shopper. We offer clear steerage and instruments for purchasers to configure their assets securely.\u201d\u00a0<\/p>\n<p>AWS continued to roll out additiona<strong>l <\/strong>safety features and enhancements to assist clients defend their information.<\/p>\n<p>The next yr, the AWS CISO, Stephen Schmidt (AWS CISO), addressed these issues at AWS re:Invent 2017. He stated: \u201cThe primary safety danger we see at present continues to be misconfiguration. We strongly encourage clients to benefit from encryption, IAM insurance policies and entry management options to stop unintentional publicity.\u201d<\/p>\n<p><strong>Lesson<\/strong>: At all times configure entry permissions rigorously and often audit cloud storage for safety dangers.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Accenture_2017\"><\/span><strong>5. Accenture (2017)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: Accenture unintentionally uncovered its inside cloud databases, which contained delicate shopper data, together with passwords, on account of weak safety configurations.<\/p>\n<p><strong>Response: <\/strong>Upon discovery, Accenture promptly secured the uncovered information and said: \u201cThere was no danger to any of our shoppers \u2013 no lively credentials, PII, or different delicate data was compromised.\u201d\u00a0<\/p>\n<p>It additional clarified that the uncovered data didn&#8217;t grant entry to shopper programs and was not associated to manufacturing information or functions.\u00a0<\/p>\n<p><strong>Lesson<\/strong>: At all times encrypt delicate information and thoroughly handle entry to cloud-based infrastructure.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_GitHub_2018\"><\/span><strong>6. GitHub (2018)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: GitHub skilled a large DDoS assault that leveraged the cloud\u2019s means to scale. The assault overwhelmed GitHub\u2019s infrastructure, however the incident confirmed how cloud providers can each allow and mitigate large-scale assaults.<\/p>\n<p><strong>Response: <\/strong>This DDoS assault was one of many largest ever recorded on the time, peaking at 1.35 terabits per second (Tbps). It was a memcached amplification assault, which leveraged unsecured memcached servers to flood GitHub\u2019s infrastructure with site visitors.<\/p>\n<p>After efficiently mitigating the assault, <a href=\"https:\/\/githubengineering.com\/\" target=\"_blank\" rel=\"noopener\">GitHub\u2019s<\/a> engineering workforce printed a weblog put up detailing the incident. It said: \u201cBetween 17:21 and 17:30 UTC, GitHub was impacted by a record-breaking volumetric DDoS assault. We briefly skilled intermittent availability, however our programs robotically mitigated the assault. We modeled our DDoS response capabilities on earlier assaults and instantly routed site visitors to our DDoS mitigation supplier.\u201d<\/p>\n<p>GitHub engineer Sam Kottler added: \u201cThis was the most important DDoS assault we \u2013 and the world \u2013 had ever seen on the time. Cloud-based mitigation methods helped take in the large inflow of site visitors.\u201d<\/p>\n<p><strong>Lesson<\/strong>: Cloud providers are extremely scalable, however it\u2019s important to have DDoS mitigation methods in place, even in cloud environments.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Capital_One_2019\"><\/span><strong>7. Capital One (2019)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: A misconfigured AWS S3 bucket uncovered delicate information from over 100 million clients. A former AWS worker exploited a vulnerability, accessing private data, credit score scores and banking particulars.<\/p>\n<p><strong>Response: <\/strong>On July 29, 2019, Capital One introduced that on July 19, 2019, it had decided there was unauthorised entry by an outdoor particular person who obtained sure forms of private data regarding individuals who had utilized for its bank card merchandise and to Capital One bank card clients.<\/p>\n<p>Capital One stated it instantly mounted the configuration vulnerability that was exploited and promptly started working with federal legislation enforcement. The person chargeable for the breach was arrested by the FBI, and Capital One provided free credit score monitoring and id safety to these affected.<\/p>\n<p><strong>Lesson<\/strong>: The significance of correct configuration administration and entry management in cloud providers.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Microsoft_2019\"><\/span><strong>8. Microsoft (2019)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident:<\/strong> In 2019, Microsoft uncovered hundreds of thousands of buyer help information on account of misconfigured cloud storage settings. The information was saved in Azure Blob Storage, and it was found that the information, which included buyer help tickets and different delicate data, have been publicly accessible on account of improper safety configurations.<\/p>\n<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920-1024x768.jpg\" alt=\"\" class=\"wp-image-104466 lazyload\" style=\"width:364px;height:auto\"><noscript><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920-1024x768.jpg\" alt=\"\" class=\"wp-image-104466 lazyload\" style=\"width:364px;height:auto\" srcset=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920-1024x768.jpg 1024w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920-300x225.jpg 300w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920-768x576.jpg 768w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920-1536x1152.jpg 1536w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/03\/building-1011876_1920.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/noscript><\/figure>\n<p><strong>Response:<\/strong> Microsoft rapidly secured the uncovered information and acknowledged {that a} third-party vendor was chargeable for the error. They clarified that the information was not accessed by malicious actors however was publicly seen because of the misconfiguration. Microsoft labored to stop related incidents sooner or later by tightening safety protocols for cloud storage.<\/p>\n<p><strong>Lesson:<\/strong> This incident highlights the essential significance of accurately configuring cloud storage and implementing correct entry controls. Common safety audits and monitoring are essential to determine and repair vulnerabilities earlier than they are often exploited.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Fb_2019\"><\/span><strong>9. Fb (2019)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: Fb uncovered over 540 million information by unsecured cloud storage, together with information equivalent to person feedback, likes, and reactions, making it susceptible to exterior entry.<\/p>\n<p><strong>Response: <\/strong>After the publicity was found, Fb acknowledged that third-party builders have been chargeable for the unsecured storage. Fb clarified that the information was indirectly leaked from its personal programs however was the results of improper safety practices by app builders who used Fb\u2019s APIs to gather person information.<\/p>\n<p>Fb reportedly labored to inform the third-party builders and inspired them to repair the safety vulnerabilities. It additionally restricted entry to the API that allowed apps to gather such information, making it more durable for future information leaks to happen on account of misconfigurations.<\/p>\n<p><strong>Lesson<\/strong>: Guarantee cloud storage is accurately configured and implement encryption to guard information at relaxation.<\/p>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Slack_2020\"><\/span><strong>10. Slack (2020)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>Incident<\/strong>: Slack\u2019s cloud infrastructure was compromised after an worker\u2019s API token was uncovered publicly. This allowed unauthorised entry to delicate company information.<\/p>\n<p><strong>Response: <\/strong>Slack acknowledged the breach and supplied particulars to clients on how the incident was dealt with. It emphasised that the incident was restricted in scope and didn&#8217;t result in a broader compromise of their infrastructure.<\/p>\n<p>In a weblog put up it said: \u201cWe&#8217;ve got decided that the incident was the results of an uncovered API token. It allowed unauthorised entry to sure components of our system. The problem has been absolutely resolved and the uncovered token has been invalidated.\u201d<\/p>\n<p>The corporate additionally burdened that no delicate person information (equivalent to personal messages or account credentials) was uncovered within the breach.<\/p>\n<p>Slack up to date its safety practices round API token administration, encouraging organisations to make use of safer strategies for dealing with API tokens and to undertake further authentication measures to stop future incidents.<\/p>\n<p><strong>Lesson<\/strong>: Recurrently monitor and rotate API tokens and keys to mitigate the danger of misuse.<\/p>\n<p>Picture by <a href=\"https:\/\/pixabay.com\/users\/kumar111aakashin-15903972\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=8598424\" target=\"_blank\" rel=\"noopener\">Akash Kumar<\/a> from <a href=\"https:\/\/pixabay.com\/\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=8598424\" target=\"_blank\" rel=\"noopener\">Pixabay<\/a><\/p>\n<p><strong><em>Need to be taught extra about cybersecurity and the cloud from trade leaders? Try\u00a0<a target=\"_blank\" href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" rel=\"noreferrer noopener\">Cyber Safety &amp; Cloud Expo<\/a>\u00a0going down in Amsterdam, California, and London.<\/em><\/strong><\/p>\n<p><strong><em>Discover different upcoming enterprise know-how occasions and webinars powered by TechForge\u00a0<a target=\"_blank\" href=\"https:\/\/techforge.pub\/events\/\" rel=\"noreferrer noopener\">right here<\/a>.<\/em><\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>As organisations more and more migrate to the cloud, securing delicate information has by no means been extra essential. Whereas cloud computing affords flexibility and scalability, it additionally opens the door to a variety of safety dangers.\u00a0 From easy misconfigurations to advanced insider threats, cloud safety breaches have value firms large sums of cash and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4323,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":{"0":"post-4321","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-computing"},"_links":{"self":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/4321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4321"}],"version-history":[{"count":1,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/4321\/revisions"}],"predecessor-version":[{"id":4322,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/4321\/revisions\/4322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/media\/4323"}],"wp:attachment":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}