Before we embark on the attack vectors that make the cloud akin to the Wild West, we need to establish that the cloud is not a mysterious entity that operates in the vacuum of deep space (insert your favorite episode of Firefly here). In fact, while there are some companies that run their own clouds exclusively for their own solution, the vast majority of companies, application vendors, and third-party service providers use ...
3. Cloud Service Providers
Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.