Sunday, 14 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > More than one-third of cloud environments are critically exposed, says Tenable
Global Market

More than one-third of cloud environments are critically exposed, says Tenable

Last updated: October 14, 2024 4:56 am
Published October 14, 2024
Share
shutterstock 166345925 open door with sunlight shining through doorway
SHARE

The failings

General, the examine mentioned, 74% of organizations had publicly uncovered storage, a few of which included delicate information. The reason for this publicity was typically pointless or extreme permissions. And, it mentioned, “as organizations ramp up their use of cloud-native functions so, too, does the quantity of delicate information they retailer there enhance — together with buyer and worker info and enterprise IP. Hackers are motivated to get at such cloud-stored information.”  Therefore most of the stories of ransomware assaults concentrating on cloud storage throughout the reporting interval aimed toward public cloud sources with extreme entry privileges and will have been prevented.

A breakdown of uncovered storage telemetry revealed that 39% of organizations have public buckets, 29% have both public or personal buckets with overprivileged entry, and 6% have public buckets with overprivileged entry.

Storage isn’t the one difficulty, nonetheless. A disturbing 84% of organizations have unused or longstanding entry keys with essential or excessive severity extreme permissions, which, the examine mentioned, “have performed main roles in quite a few identity-based assaults and compromises.” It cited the MGM Resorts information breach, the Microsoft electronic mail hack, and the FBot malware concentrating on internet servers, cloud providers, and software-as-a-service, which achieves persistency and propagates on AWS by way of AWS IAM (identity and access management) customers as three examples of how the keys might be abused.

“Core to IAM dangers are entry keys and their assigned permissions; mixed, they’re actually the keys to the dominion of cloud-stored information,” it famous.

Add in the truth that 23% of cloud identities on the key hyperscalers (Amazon Net Providers, Google Cloud Platform, and Microsoft Azure), each human and non-human, have essential or excessive severity extreme permissions, and you’ve got a recipe for catastrophe.

See also  Red Sea cable cuts disrupted up to 70% of traffic, says RETN

This example is partly right down to human nature, based on Scott Younger, principal advisory director at Data-Tech Analysis Group.

Source link

TAGGED: cloud, critically, Environments, exposed, onethird, Tenable
Share This Article
Twitter Email Copy Link Print
Previous Article OpenAI unveils experimental 'Swarm' framework, igniting debate on AI-driven automation OpenAI unveils experimental ‘Swarm’ framework, igniting debate on AI-driven automation
Next Article How fibre networks empower cloud computing’s infrastructure Cloud is essential for scalable growth
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Cloud and Technology Companies Continue to Dominate the Global Demand for Data Center Capacity Uptake

DUBLIN, March 21, 2024 /PRNewswire/ -- The "Worldwide Data Center Colocation Market - Investment Prospects in 9…

March 22, 2024

F5, Nvidia team to boost AI, cloud security

F5 BIG-IP Subsequent for Kubernetes deployed on Nvidia BlueField-3 DPUs affords a safe and compliant…

October 27, 2024

The role of edge computing in expanding cloud AI deployments

Because the adoption of business AI options akin to ChatGPT and Google Bard proceed to…

May 28, 2024

Researchers Say Quantum Computers Could Scale Fast With Modular Design

Quantum computer systems may resolve a number of the world’s most difficult issues, however provided…

May 31, 2024

Lenovo to acquire Infinidat to expand its storage folio

The corporate, which CEO Phil Bullinger at present leads, was based by Moshe Yanai in…

January 18, 2025

You Might Also Like

AI training
Global Market

Cybersecurity skills matter more than headcount in an AI era: ISC2 study

By saad
shutterstock 2291065933 space satellite in orbit above the Earth white clouds and blue sea below
Global Market

Aetherflux joins the race to launch orbital data centers by 2027

By saad
Data center / enterprise networking
Global Market

P4 programming: Redefining what’s possible in network infrastructure

By saad
Why data centre megadeals must prove their value
Global Market

Why data centre megadeals must prove their value

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.