article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

They can exploit cloud provider metadata services, for instance, to access temporary identity and access management ( IAM )credentials. In order to properly secure a cloud environment, you need a good design and clear use case so you can wield the platform tools effectively and extend them with third party services where needed.

Cloud 157