Capital One was hit with an $80 million fine because of a cloud misconfiguration. Today’s columnist, Carolyn Crandall of Attivo Networks, offers insights on how to prevent these errors. danreed! CreativeCommons Credit: CC BY-NC 2.0

The rapid deployment and expansion of cloud technology over the past year has led to a dangerous rise in misconfigurations—a vulnerability that cybercriminals are only too eager to exploit. It’s increasingly critical for organizations to identify and implement tools to protect themselves from opportunistic attackers looking to take advantage of these misconfigurations. These tools must deliver visibility into potential security gaps, attack path vulnerabilities, exposed credentials, and suspicious account activity. As more organizations fall victim to misconfiguration-driven breaches, it has never been more important to have a strong understanding of what causes these breaches and how to defend against them.

The cost of misconfiguration-driven breaches

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.