Identity & Access Management tools now the most common source of cloud misconfiguration bugs, report

John Leonard
clock • 2 min read

IAM misconfiguration has played an increasing role in cloud breaches over the past few years, finds Sonatype/Fugue research

Cloud misconfigurations are an increasingly prevalent source of security and compliance vulnerabilities, according to the latest annual report by Sonatype and Fugue, The State of Cloud Security 202...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Nutanix: We're staying true to open source

Open Source

HCI vendor promises to support CNCF projects 'across all environments'

clock 23 May 2024 • 4 min read
Teradata CEO: 'ChatGPT is a great catalyst for analytics innovation'

Big Data and Analytics

'We're in the sweet spot for data, analytics and cloud', says Steve McMillan

clock 04 October 2023 • 4 min read
EU Cyber Resilience Act is a threat to open source in Europe, industry 

Open Source

Legislation, which passed last week, criticised for a lack of understanding of the open source model

clock 24 July 2023 • 4 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security Technology

Google strengthens Advanced Protection Program with passkey integration

Google strengthens Advanced Protection Program with passkey integration

To enroll in APP with a passkey, users need a compatible device and browser

clock 12 July 2024 • 3 min read
NCSC CTO: UK tech sector not incentivising companies to build secure software

NCSC CTO: UK tech sector not incentivising companies to build secure software

Calls for market reform to usher in secure future tech

clock 17 May 2024 • 2 min read
Wales launches CymruSOC, the UK's first national cybersecurity operations centre

Wales launches CymruSOC, the UK's first national cybersecurity operations centre

A ‘defend as one' approach for public services

John Leonard
clock 10 May 2024 • 1 min read