Friday, 6 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > More than one-third of cloud environments are critically exposed, says Tenable
Global Market

More than one-third of cloud environments are critically exposed, says Tenable

Last updated: October 14, 2024 4:56 am
Published October 14, 2024
Share
shutterstock 166345925 open door with sunlight shining through doorway
SHARE

The failings

General, the examine mentioned, 74% of organizations had publicly uncovered storage, a few of which included delicate information. The reason for this publicity was typically pointless or extreme permissions. And, it mentioned, “as organizations ramp up their use of cloud-native functions so, too, does the quantity of delicate information they retailer there enhance — together with buyer and worker info and enterprise IP. Hackers are motivated to get at such cloud-stored information.”  Therefore most of the stories of ransomware assaults concentrating on cloud storage throughout the reporting interval aimed toward public cloud sources with extreme entry privileges and will have been prevented.

A breakdown of uncovered storage telemetry revealed that 39% of organizations have public buckets, 29% have both public or personal buckets with overprivileged entry, and 6% have public buckets with overprivileged entry.

Storage isn’t the one difficulty, nonetheless. A disturbing 84% of organizations have unused or longstanding entry keys with essential or excessive severity extreme permissions, which, the examine mentioned, “have performed main roles in quite a few identity-based assaults and compromises.” It cited the MGM Resorts information breach, the Microsoft electronic mail hack, and the FBot malware concentrating on internet servers, cloud providers, and software-as-a-service, which achieves persistency and propagates on AWS by way of AWS IAM (identity and access management) customers as three examples of how the keys might be abused.

“Core to IAM dangers are entry keys and their assigned permissions; mixed, they’re actually the keys to the dominion of cloud-stored information,” it famous.

Add in the truth that 23% of cloud identities on the key hyperscalers (Amazon Net Providers, Google Cloud Platform, and Microsoft Azure), each human and non-human, have essential or excessive severity extreme permissions, and you’ve got a recipe for catastrophe.

See also  7 MCP Servers To Automate Data Center and Cloud Tasks

This example is partly right down to human nature, based on Scott Younger, principal advisory director at Data-Tech Analysis Group.

Source link

TAGGED: cloud, critically, Environments, exposed, onethird, Tenable
Share This Article
Twitter Email Copy Link Print
Previous Article OpenAI unveils experimental 'Swarm' framework, igniting debate on AI-driven automation OpenAI unveils experimental ‘Swarm’ framework, igniting debate on AI-driven automation
Next Article How fibre networks empower cloud computing’s infrastructure Cloud is essential for scalable growth
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Hummingbird launches AI-powered automation product for fi-crime

The fast advance of generative AI content material creation instruments resembling voice cloning, video and…

February 21, 2024

Aluminium OS is the AI-powered successor to ChromeOS

The convergence of cellular and desktop working techniques is a purpose that has remained elusive…

December 6, 2025

Intel teams with SoftBank to develop new memory type

Nonetheless, don’t count on something anytime quickly. Intel’s Director of World Strategic Partnerships Sanam Masroor…

February 9, 2026

Quantum Computing Could Deliver ‘Next Global Shock’ – WEF | DCN

International economy non-governmental organization The World Economic Forum (WEF) has described quantum computing as “the…

January 23, 2024

Data Center News Roundup: Google Unveils Investment, Storage Trends | DCN

With data center news moving faster than ever, we want to make it easy for…

January 22, 2024

You Might Also Like

URL HTTP Web Address
Global Market

AI transforms ‘dangling DNS’ into automated data exfiltration pipeline

By saad
Can data centres scale AI without putting water under pressure?
Global Market

Can data centres scale AI without putting water under pressure?

By saad
Cisco building exterior with sign
Global Market

Cisco issues emergency patches for critical firewall vulnerabilities

By saad
Steel joints. Mounting bolted connection of steel beams before welding. Metal construction covered protective gray primer. Close-up.
Global Market

Data center new builds diminish even as demand rises

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.