Identity & Access Management tools now the most common source of cloud misconfiguration bugs, report

John Leonard
clock • 2 min read

IAM misconfiguration has played an increasing role in cloud breaches over the past few years, finds Sonatype/Fugue research

Cloud misconfigurations are an increasingly prevalent source of security and compliance vulnerabilities, according to the latest annual report by Sonatype and Fugue, The State of Cloud Security 202...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Teradata CEO: 'ChatGPT is a great catalyst for analytics innovation'

Big Data and Analytics

'We're in the sweet spot for data, analytics and cloud', says Steve McMillan

clock 04 October 2023 • 4 min read
EU Cyber Resilience Act is a threat to open source in Europe, industry 

Open Source

Legislation, which passed last week, criticised for a lack of understanding of the open source model

clock 24 July 2023 • 4 min read
Oracle UK head Siobhan Wilson: 'Regulation is a big decision-making element in cloud'

Cloud and Infrastructure

Laws like the GDPR are driving the evolution of cloud computing

clock 20 July 2023 • 3 min read

More on Security Technology

UK's biometrics commissioners steps down, signalling missteps

UK's biometrics commissioners steps down, signalling missteps

Home Office is ignoring new technologies

Muskan Arora
clock 31 January 2024 • 4 min read
Endpoint is the path of least resistance, says Threatlocker

Endpoint is the path of least resistance, says Threatlocker

IT Leaders Summit debates the true purpose of endpoint security.

Penny Horwood
clock 05 October 2023 • 2 min read
GitHub announces passwordless authentication trial

GitHub announces passwordless authentication trial

The trial can be considered a milestone in the long demise of passwords

Penny Horwood
clock 13 July 2023 • 2 min read