Even with cloud providers implementing defenses, glaring weaknesses remain

3-22-2

A new report from RedLock offers a look at the threats and vulnerabilities that continue to mount in public cloud computing environments.Poor user and API access hygiene, combined with ineffective visibility and user activity monitoring, are causing organizations to be more vulnerable to breaches. For example, 73% of organizations allow the root user account to be used to perform activities – behavior that goes against security best practices.

Click here to view original webpage at www.helpnetsecurity.com

Categories:

Your e-mail address will not be published.
Required fields are marked*