* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Thursday, August 21, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    What Are Our Predictions for Taylor Swift’s ‘Life of a Showgirl’ Based on What She’s Told Us So Far? – yahoo.com

    Uncover the Hidden Surprises in Taylor Swift’s ‘Life of a Showgirl’ – Can You Decode Her Clues?

    Bama Dining Serving Up New Food, Entertainment – UA News Center

    Bama Dining Launches Thrilling New Food and Entertainment Experiences

    The latest on Williams-Brice Stadium renovations, entertainment district – On3

    Discover the Thrilling New Upgrades Coming to Williams-Brice Stadium and Its Vibrant Entertainment District!

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    ‘The Lucky Ones’: Mae Ngai Sells Film & TV Rights To Neurosphere Entertainment – Deadline

    The Lucky Ones’: Mae Ngai Lands Thrilling Deal for Film and TV Adaptations

    Our picks for the best things to do in Cincinnati this week, Aug. 18-24 – Cincinnati Enquirer

    Unmissable Things to Do in Cincinnati This Week, Aug. 18-24

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Denver man receives pacemaker using new technology – CBS News

    Denver Man’s Life Transformed by Revolutionary Pacemaker Technology

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    YSU to celebrate launch of new radiology technology program – WKBN.com

    YSU Launches Exciting New Radiology Technology Program Celebration

    Thaddeus Stevens College of Technology kicks off return to school for Lancaster County colleges [photos] – LancasterOnline

    Thaddeus Stevens College of Technology Kicks Off an Exciting New School Year for Lancaster County Colleges [Photos]

    Empyrean Technology’s revenue climbs, but profit plunges 92% in EDA spending squeeze – digitimes

    Empyrean Technology’s Revenue Skyrockets as Profits Plunge 92% Amid EDA Spending Crunch

    5G-A technology provides strong support for China’s football sensation Suchao – Global Times

    How 5G-A Technology is Revolutionizing China’s Football Star Suchao

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    What Are Our Predictions for Taylor Swift’s ‘Life of a Showgirl’ Based on What She’s Told Us So Far? – yahoo.com

    Uncover the Hidden Surprises in Taylor Swift’s ‘Life of a Showgirl’ – Can You Decode Her Clues?

    Bama Dining Serving Up New Food, Entertainment – UA News Center

    Bama Dining Launches Thrilling New Food and Entertainment Experiences

    The latest on Williams-Brice Stadium renovations, entertainment district – On3

    Discover the Thrilling New Upgrades Coming to Williams-Brice Stadium and Its Vibrant Entertainment District!

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    1000+ Entertainment Leaders Release Open Letter Criticizing TIFF’s Handling of Film – Creative Community for Peace

    ‘The Lucky Ones’: Mae Ngai Sells Film & TV Rights To Neurosphere Entertainment – Deadline

    The Lucky Ones’: Mae Ngai Lands Thrilling Deal for Film and TV Adaptations

    Our picks for the best things to do in Cincinnati this week, Aug. 18-24 – Cincinnati Enquirer

    Unmissable Things to Do in Cincinnati This Week, Aug. 18-24

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Denver man receives pacemaker using new technology – CBS News

    Denver Man’s Life Transformed by Revolutionary Pacemaker Technology

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    Morgan County Rescue Squad is using new technology to recover people missing in the water faster – WAFF

    YSU to celebrate launch of new radiology technology program – WKBN.com

    YSU Launches Exciting New Radiology Technology Program Celebration

    Thaddeus Stevens College of Technology kicks off return to school for Lancaster County colleges [photos] – LancasterOnline

    Thaddeus Stevens College of Technology Kicks Off an Exciting New School Year for Lancaster County Colleges [Photos]

    Empyrean Technology’s revenue climbs, but profit plunges 92% in EDA spending squeeze – digitimes

    Empyrean Technology’s Revenue Skyrockets as Profits Plunge 92% Amid EDA Spending Crunch

    5G-A technology provides strong support for China’s football sensation Suchao – Global Times

    How 5G-A Technology is Revolutionizing China’s Football Star Suchao

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Business

How to manage cloud exploitation at the edge

July 17, 2023
in Business
How to manage cloud exploitation at the edge
Share on FacebookShare on Twitter

Small- and medium-sized businesses and enterprises have accelerated their move into the cloud since the global pandemic. The Infrastructure-as-a-Service (IaaS) cloud computing model enables remote working, supports digital transformation, provides scale, increases resilience, and can reduce costs. However, this shift requires a thorough understanding of the security implications and how a business can protect its data and applications.

As with all technology introductions, it’s important to have clear security policies, tools, processes, and training. Cloud infrastructure is especially sensitive, as many critical applications are at risk, such as customer-facing applications. Companies that have embraced the cloud need to understand the Shared Responsibility Model: a security and compliance framework that explains what shared infrastructure and systems the cloud provider is responsible for maintaining and how a customer is responsible for operating systems, data, and applications utilizing the cloud. Unless the model is understood and followed, it could lead to data, applications, and cloud workloads being exposed to security vulnerabilities.

Good Dog Communications in Partnership with Verizon and Edgio recently hosted a webinar, “The Rise of Cloud Exploitation, ” that spoke directly to cyberthreats targeting web apps and security best practices. Watch on-demand here.

How is the cloud being attacked and why?

Cloud exploitation involves targeting vulnerabilities in cloud infrastructure, applications, or services to gain unauthorized access, disrupt operations, steal data, or carry out other malicious activities. A cloud exploitation playbook could include attack vectors like distributed denial-of-service (DDoS) attacks, web application attacks, and bots –  with the number one attack target being web applications. According to the 2023 Verizon Data Breach Investigations Report (DBIR), the majority of cyber attacks are led by organized criminals looking to disrupt business and steal data to sell. The number one reason (95%) for cyber attacks is financial gain, with 24% of all cyber attacks involving ransomware.

Common cloud exploitation outcomes

Unauthorized Access: Attackers may attempt to gain unauthorized access to cloud accounts, systems, or data by exploiting weak or stolen credentials, misconfigurations, or vulnerabilities in the cloud environment. Once inside, they can potentially access sensitive information, modify data, or launch further attacks.

Data Breaches: Cloud exploitation can result in data breaches, where attackers gain access to sensitive data stored in the cloud. This can occur due to insecure configurations, inadequate access controls, or vulnerabilities in cloud storage or databases. The stolen data can be used for various malicious purposes, such as identity theft, financial fraud, or corporate espionage.

Distributed Denial of Service (DDoS): Attackers may launch DDoS attacks against cloud services or applications, overwhelming them with a high volume of malicious traffic or requests. This can lead to service disruptions, making the cloud resources unavailable for legitimate users.

Malware Distribution: Cloud exploitation can involve hosting or distributing malware through cloud-based platforms or services. Attackers may upload malicious files or applications to cloud storage or use cloud infrastructure to propagate malware to unsuspecting users.

Account Hijacking: Cloud exploitation can involve the compromise of user accounts, allowing attackers to gain control over cloud resources. This can occur through techniques like phishing, social engineering, or exploiting vulnerabilities in authentication mechanisms. Once an account is hijacked, attackers can abuse the cloud resources for their own purposes or launch attacks from within the compromised account.

What can businesses do? Respond to threats with speed

Threat detection and mitigation speed are important for three key reasons. First, adversaries are adept at learning from open-source intelligence to develop new tactics, techniques, and procedures (TTPs) making rapid security response imperative. Second, cyber criminals are well-organized and act fast. Verizon’s 2023 DBIR noted, “more than 32% of all Log4j scanning activity over the course of the year happened within 30 days of its release (with the biggest spike of activity occurring within 17 days).” And, finally, the importance of speed is clearly illustrated by the fact that companies that contain a security breach in less than 30 days can save $1M or more.

To reduce the risk of cloud exploitation, it is crucial that businesses implement strong security measures, such as robust access controls, encryption, regular security assessments, and monitoring of cloud environments. Implementing Web Application and API Protection (WAAP) at the edge is critical to identifying and mitigating a variety of threats such as DDoS attacks, API abuse, and malicious bots. Modern-day WAAPs utilize machine learning and behavioral and signature fingerprinting for early threat detection. Further, companies using AI and automation see breaches that are 74 days shorter and save $3 million more than those without.

A WAAP rapid threat detection and mitigation solution is an invaluable tool for DevSecOps teams to implement an optimized “Observe-Orient-Decide-Act” (OODA) loop to improve:

Meantime to Detect (MTTD) and

Meantime to Respond (MTTR) as new threats arise.

The latest innovation is a “Dual WAAP” capability that enables DevSecOp teams to test new rules in audit mode against production traffic to verify their effectiveness while lowering the risk of blocking legitimate site traffic. This increased confidence, plus the ability to integrate with existing CI/CD workflows, allows teams to push effective virtual patches out faster, closing the door on attackers more quickly than ever before. Additionally, with Dual WAAP, there is no WAAP downtime while updating rulesets, with new rules deployed across the global network sometimes in under 60 seconds.

Edgio

The hidden threat: open-source code

The Verizon DBIR noted that exploited web application vulnerabilities account for 5% of breaches. These web application vulnerabilities can stem from codebases that use open-source code.  In the Verizon webinar, “The Rise of Cloud Exploitation”, Edgio’s Richard Yew, Senior Director, Product Management – Security, highlighted findings from the 2023 Synopsys report that showed the extent of open source code and how much risk exists in legacy applications. Here are some shocking findings: 

Edgio

To close

Cloud Infrastructure-as-a-Service has brought extreme agility to organizations. However, cloud exploitation is on the rise and it is clear from the Shared Responsibility Model that companies are partners in ensuring a secure enterprise. Cloud service providers play a crucial role in securing the cloud infrastructure, but companies must apply solutions to enhance security and protect against exploitation of operating systems, applications, endpoints, and data.

A powerful choice in the cyberthreat fight is a WAAP solution. It offers rapid threat detection and mitigation and is an invaluable tool for DevSecOps teams to implement an optimized “Observe-Orient-Decide-Act” (OODA) loop to improve both mean time to detect (MTTD) and mean time to respond (MTTR) as new threats arise.

Edgio is a global edge platform with 300+ Points of Presence and 250+ Tbps of capacity that helps companies build, secure, and deliver amazing app experiences. Its WAAP security platform enables organizations to implement effective security into modern web applications, innovate faster and mitigate risks with its unified, multi-layer approach. Talk to an expert to protect your cloud applications today.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : CIO – https://www.cio.com/article/646452/how-to-manage-cloud-exploitation-at-the-edge.html

Tags: businesscloudManage
Previous Post

Leverage Avaya’s Expertise in AI-driven CX Innovation

Next Post

“Watchmen” Paved The Way For Avengers?

OpenAI may soon be the world’s most valuable private company—but CEO Sam Altman won’t profit much, with no equity and just a $76,001 salary – Fortune

OpenAI Poised to Become the World’s Most Valuable Private Company-Yet CEO Sam Altman Earns Only $76,001 Without Equity

August 21, 2025
It’s the Economy, Donald – WIRED

It’s the Economy, Donald – WIRED

August 21, 2025
What Are Our Predictions for Taylor Swift’s ‘Life of a Showgirl’ Based on What She’s Told Us So Far? – yahoo.com

Uncover the Hidden Surprises in Taylor Swift’s ‘Life of a Showgirl’ – Can You Decode Her Clues?

August 21, 2025

How the Right People and Processes Unlock Success in Health AI Implementation

August 21, 2025
A new twist in Syria: a political opposition – The Economist

A Surprising New Chapter in Syria’s Political Opposition

August 21, 2025
Jalene LaMontagne, colleagues win Robert P. McIntosh Award from the Vegetation Section of the Ecological Society of America for research on community synchrony in seed production – UMSL Blogs

Jalene LaMontagne, colleagues win Robert P. McIntosh Award from the Vegetation Section of the Ecological Society of America for research on community synchrony in seed production – UMSL Blogs

August 21, 2025
Scientists just found a hidden factor behind Earth’s methane surge – ScienceDaily

Scientists Uncover Surprising Hidden Cause Behind Earth’s Methane Surge

August 21, 2025
50 Years After Discovery, Mysterious ‘Eye of Sauron’ Jets May Finally Be Solved – ScienceAlert

50 Years On, the Mystery of the ‘Eye of Sauron’ Jets Could Finally Be Unraveled

August 21, 2025
Off-gridder shares inside look at difficult aspects of lifestyle: ‘I’m willing to make sacrifices’ – yahoo.com

Living Off the Grid: One Person’s Raw and Honest Journey Through Tough Challenges and Sacrifices

August 21, 2025
Families turn to pawn shops for more affordable technology for school year – WVIR

Why Families Are Turning to Pawn Shops for Affordable Back-to-School Tech

August 21, 2025

Categories

Archives

August 2025
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Jul    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (782)
  • Economy (804)
  • Entertainment (21,682)
  • General (16,592)
  • Health (9,843)
  • Lifestyle (815)
  • News (22,149)
  • People (805)
  • Politics (812)
  • Science (16,016)
  • Sports (21,301)
  • Technology (15,783)
  • World (785)

Recent News

OpenAI may soon be the world’s most valuable private company—but CEO Sam Altman won’t profit much, with no equity and just a $76,001 salary – Fortune

OpenAI Poised to Become the World’s Most Valuable Private Company-Yet CEO Sam Altman Earns Only $76,001 Without Equity

August 21, 2025
It’s the Economy, Donald – WIRED

It’s the Economy, Donald – WIRED

August 21, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version