Cloud 101CircleEventsBlog
Join Jim Reavis, CEO of CSA, & AT&T's top advisors on May 22 in Seattle for key security insights!

Download Publication

Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation
Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation

Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation

Release Date: 02/07/2022

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In this sixth installment, we surveyed 703 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results and its expertise to create the 2022 Top Cloud Threats report - the ‘Pandemic Eleven’.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024
How to Design an IT Service Model for End User Happiness
How to Design an IT Service Model for End User Happiness
Published: 05/15/2024
Unveiling the Dark Arts of Exploiting Trust
Unveiling the Dark Arts of Exploiting Trust
Published: 05/14/2024
5 Best Practices to Secure Your Azure Resources
5 Best Practices to Secure Your Azure Resources
Published: 05/13/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training