Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc
The Last Watchdog
JULY 21, 2020
They can exploit cloud provider metadata services, for instance, to access temporary identity and access management ( IAM )credentials. In order to properly secure a cloud environment, you need a good design and clear use case so you can wield the platform tools effectively and extend them with third party services where needed.
Let's personalize your content