1. Home
  2. Cloud Computing
  3. Cloud Security Threats – Abuse and nefarious use of cloud services

Cloud Security Threats – Abuse and nefarious use of cloud services


This blog will look at the abuse and nefarious use of cloud services. This is one of the top threats identified by the Cloud Security Alliance in their recent white paper ‘The Treacherous Twelve – Cloud Computing Top Threats in 2016’, sponsored by HPE Security – Data Security, and available to download here.

One of the advantages of a cloud model is the ability to dynamically up and downscale resources as the business requires. However this same flexibility affords attackers a dynamic environment in which to create their attacks. It is relatively cheap to rent space from a cloud service provider (CSP) and to use the CPU power and network bandwidth to launch DDoS attacks, run malicious websites, or control botnets. The solution to this problem is not simple – an acceptable use policy can set down the rules, but due to the automation that is involved in provisioning new cloud instances, it is often too late before a CSP identifies a nefarious cloud instance.

Another problem related to the misuse of cloud services is cyber criminals taking advantage of the free trial period offered by some CSPs – we recently spoke with a service provider customer who had automated the provisioning of a free trial period, which in turn was being white-labeled and resold by a team of Chinese hackers!

Read the entire article here, Cloud Security Threats – Abuse and nefarious use of cloud services

via the fine folks at HP Enterprise.

HP Enterprise Hewlett Packard Enterprise is an industry leading technology company that enables customers to go further, faster. With the industry's most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure.

Featured Resources:

Related Articles:


White Papers

‘All You Need to Know About Microsoft Windows Nano Server’ Veeam White Paper

Now updated for Windows Server 2016 GA release! You probably heard about Windows Nano Server already … but what is it exactly, and how do you get started with it? What value will it bring to your environment? Nano Server is a headless, 64-bit only deployment option for Windows Server 2016. Microsoft created this component specifically with […]


Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

On-Demand Webinars

Architecting for today’s desktop environments – FSLogix On-Demand Webinar

October 19, 2017 Webinar with David Young, Solutions Architect and Product Champion, and Brandon Lee, Solutions Marketer. Video Recording of a live demo of FSLogix and an overview of the latest release of FSLogix Apps featuring Roaming XenApp Email Search and OneDrive App along with Skype for Business Global Address List and Device Based Licensing. […]

Latest Videos

Current State of EUC – E2EVC Video

Session from @E2EVC 2017 Orlando. For event information please visit www.e2evc.com/home. For slides, additional info etc please contact the presenter directly on Twitter. For best video and sound quality do visit the event! This video is from the fine folks at E2EVC Conference

Views All IT News on DABCC.com
Views All IT Videos on DABCC.com
Win a Tesla P100D

Visit Our Sponsors