{"id":476,"date":"2023-06-07T10:04:36","date_gmt":"2023-06-07T03:04:36","guid":{"rendered":"https:\/\/wsc.idu.ac.id\/?p=476"},"modified":"2023-09-08T14:25:05","modified_gmt":"2023-09-08T07:25:05","slug":"cloud-security-report-sample-only","status":"publish","type":"post","link":"https:\/\/wsc.idu.ac.id\/index.php\/2023\/06\/07\/cloud-security-report-sample-only\/","title":{"rendered":"Cloud Security Report (Sample Only)"},"content":{"rendered":"<p>Organizations continue to adopt cloud computing at a rapid pace to benefit from the promise of increased efficiency, better scalability, and improved agility.<br \/>\nWhile cloud service providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) continue to expand security services to protect their evolving cloud platforms, it is ultimately the customers\u2019 responsibility to secure their data within these cloud environments.<br \/>\nThe 2019 Cloud Security Report highlights what is and what is not working for security operations teams in securing their cloud data, systems, and services in this shared responsibility model.The results are a continuation of past challenges:<br \/>\n\u2022 The top three cloud security challenges faced by cybersecurity professionals are data privacy (52%) and protecting against data loss and leakage (51%).<br \/>\n\u2022    Insecure interfaces and APIs take the number one spot in this year\u2019s survey as the single biggest perceived vulnerability to cloud security (57%). This is followed by misconfiguration of the cloud platform (48%),and unauthorized access through misuse of employee credentials and improper access controls (46%).<br \/>\n\u2022 The top two operational security headaches SOC teams are struggling with are compliance (45%) and lack of qualified security staff (44%).<br \/>\nOverall, the findings in this report emphasize that security teams must reassess their security posture and strategies, and address the shortcomings of legacy security tools to protect their evolving IT environments.<br \/>\nThis 2019 Cloud Security Report has been produced by Cybersecurity Insiders, the 400,000 member information security community, to explore how organizations are responding to the evolving security threats in the cloud.<\/p>\n<p><a href=\"https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/final-2019-cloud-security-report-netskope.pdf\">final-2019-cloud-security-report-netskope<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations continue to adopt cloud computing at a rapid pace to benefit from the promise of increased efficiency,<\/p>\n","protected":false},"author":1,"featured_media":477,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"class_list":["post-476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-buku-referensi-wsc-2023"],"featured_image_urls":{"full":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"thumbnail":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",115,150,false],"medium":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"medium_large":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"large":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"1536x1536":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"2048x2048":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"darknews-slider-full":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"darknews-featured":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"darknews-medium":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false],"darknews-medium-square":["https:\/\/wsc.idu.ac.id\/wp-content\/uploads\/2023\/06\/csr.png",197,258,false]},"author_info":{"display_name":"wsc","author_link":"https:\/\/wsc.idu.ac.id\/index.php\/author\/wsc\/"},"category_info":"<a href=\"https:\/\/wsc.idu.ac.id\/index.php\/category\/buku-referensi-wsc-2023\/\" rel=\"category tag\">Buku Referensi WSC 2023<\/a>","tag_info":"Buku Referensi WSC 2023","comment_count":"0","_links":{"self":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":1,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts\/476\/revisions"}],"predecessor-version":[{"id":479,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/posts\/476\/revisions\/479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/media\/477"}],"wp:attachment":[{"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/categories?post=476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsc.idu.ac.id\/index.php\/wp-json\/wp\/v2\/tags?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}