Orca Security public cloud security report reveals how most large cloud breaches happen

Orca Security 2020 State of Public Cloud Security Report

Graham Cluley Security News is sponsored this week by the folks at Orca Security. Thanks to the great team there for their support!

You’re probably familiar with the shared responsibility model. The basic idea is that public cloud providers such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) keep their platforms secure, but customers are still responsible for securing the workloads, data, and processes they run inside the cloud – just as they do in their on-prem world.

The world of cybersecurity isn’t fair. Security teams need to secure everything, but attackers need only find one weak link. For most organizations, cloud workload security is dependent upon the installation and maintenance of security agents across all assets. Something that rarely happens, as this report shows.

For example, 81% of organizations have at least one neglected internet-facing workload.

Download the free report now (no registration required) to:

  • Benchmark your public cloud security posture against your peers
  • See the weak links and exploitation paths attackers are looking for
  • Identify the most common authentication issues hiding inside public cloud estates
  • Get 4 key recommendations to avoid a major breach

Orca Security provides cloud-wide, workload-deep security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents.

Connect your first cloud account in minutes and see for yourself. See a demo and try for free today.

If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about cybersecurity, you can find more information here.