The Treacherous 12 Cloud Computing Top Threats in 2016
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and
created new security challenges. The development of the cloud service model delivers business-supporting
technology more efficiently than ever before. The shift from server to service-based thinking is transforming the
way technology departments think about, design, and deliver computing technology and applications. Yet these
advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security
issues whose full impact are finally being understood. Among the most significant security risks associated with
cloud computing is the tendency to bypass information technology (IT) departments and information officers.
Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that
business-level security policies, processes, and best practices are taken into account. In the absence of these
standards, businesses are vulnerable to security breaches that can erase any gains made by the switch to cloud
technology.
Hewlett Packard Enterprise and Intel® are the sponsors of this material. By submitting your information you agree to be contacted by Hewlett Packard Enterprise on topics of interest. Before deciding please review Hewlett Packard Enterprise’s privacy statement.
Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.