Minimize risks in public cloud

by | Apr 23, 2015

ETIQUETAS: Cloud-en | Security | Tips

Data security is one of the issues that most concern companies when deciding about public or private cloud.

Usually, organizations tend to be more skeptical with public cloud, but there are a number of tests that can be run to identify and fix possible security holes in this type of clouds.

In order to perform these tests, first you will have select a fragment of the cloud environment that you want to test and then, you will be ready to define the strategy to be followed.

One of the actions that you can carry out is try to penetrate the part of the system that we are testing with any exposed access mechanism as, for example, a user interface, a set of APIs, or primitive access points that lead straight to the infrastructure.

To simulate attacks, we recommend using various automatic security testing tools, since most incorporate tools that collect information about response times and defense methods.

If you want to know the most common attacks that private clouds receive and learn more about safety tests, read the full article in SearchCloudComputing



Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content