{"id":1354182,"date":"2017-07-02T13:38:59","date_gmt":"2017-07-02T19:38:59","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1354182"},"modified":"2018-01-11T02:06:23","modified_gmt":"2018-01-11T07:06:23","slug":"cloud-security","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/cloud-security\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"<div id=\"pl-1354182\"  class=\"panel-layout\" ><div id=\"pg-1354182-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1354182-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1354182-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1354182-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Cloud Security<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1354182-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"bd3100bgzo\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037657\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Interpol Operation Synergia ransomware phishing\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-300x117.jpg 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1024x399.jpg 1024w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-768x299.jpg 768w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1536x598.jpg 1536w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0.jpg 1540w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037649\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108-760x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"web browser, web, Menlo Security web domain browser SaaS credentials, attack, cybercriminals INKY web credentials Shodan EV certificates\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"_self cvplbd\" target=\"_self\" >Protecting Web-Based Work: Connecting People, Web Browsers and Security<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/anupam-upadyaya\/\" rel=\"author\">Anupam Upadyaya<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T03:03:19-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037607\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self cvplbd\" target=\"_self\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#bd3100bgzo\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#bd3100bgzo\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-035435b39w\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1354182-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037657\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Interpol Operation Synergia ransomware phishing\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">November 27, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/africa-cybersecurity\/' title='Africa Cybersecurity' class='pt-cv-tax-africa-cybersecurity'>Africa Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/interpol\/' title='Interpol' class='pt-cv-tax-interpol'>Interpol<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-scams\/' title='online scams' class='pt-cv-tax-online-scams'>online scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed \"Operation Serengeti\" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037649\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"web browser, web, Menlo Security web domain browser SaaS credentials, attack, cybercriminals INKY web credentials Shodan EV certificates\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/08\/canstockphoto31556108-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"_self cvplbd\" target=\"_self\" >Protecting Web-Based Work: Connecting People, Web Browsers and Security<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/anupam-upadyaya\/\" rel=\"author\">Anupam Upadyaya<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T03:03:19-05:00\">November 27, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cloud\/' title='Cloud' class='pt-cv-tax-cloud'>Cloud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-attacks\/' title='cyber attacks' class='pt-cv-tax-cyber-attacks'>cyber attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sase\/' title='SASE' class='pt-cv-tax-sase'>SASE<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/web-browsers\/' title='Web Browsers' class='pt-cv-tax-web-browsers'>Web Browsers<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037607\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self cvplbd\" target=\"_self\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-supply-chain-attack\/' title='software supply chain attack' class='pt-cv-tax-software-supply-chain-attack'>software supply chain attack<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/starbucks\/' title='Starbucks' class='pt-cv-tax-starbucks'>Starbucks<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037509\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"military\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/ai-generated-8662832_1280-1-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self cvplbd\" target=\"_self\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/elasticsearch\/' title='elasticsearch' class='pt-cv-tax-elasticsearch'>elasticsearch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/enamelpins\/' title='enamelpins' class='pt-cv-tax-enamelpins'>enamelpins<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/leaked-data\/' title='leaked data' class='pt-cv-tax-leaked-data'>leaked data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037480\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"China, threats, scams, CISA TP-Link Volt Typhoon Salt Typhoon\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/10\/China-Infiltrate-US-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self cvplbd\" target=\"_self\" >The Cyberthreats from China are Ongoing: U.S. Officials<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:32:00-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/salt-typhoon-cyberattack\/' title='Salt Typhoon cyberattack' class='pt-cv-tax-salt-typhoon-cyberattack'>Salt Typhoon cyberattack<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/telecom-networks\/' title='Telecom Networks' class='pt-cv-tax-telecom-networks'>Telecom Networks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/volt-typhoon\/' title='Volt Typhoon' class='pt-cv-tax-volt-typhoon'>Volt Typhoon<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037360\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"North Korea IT worker scam\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fake-it-worker-scam\/' title='fake IT worker scam' class='pt-cv-tax-fake-it-worker-scam'>fake IT worker scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-cyber-espionage\/' title='North Korean cyber espionage' class='pt-cv-tax-north-korean-cyber-espionage'>North Korean cyber espionage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037545\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/aembit-launches-prometheus-metrics-support\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Aembit Launches Prometheus Metrics Support\" title=\"\" data-cvpsrc=\"https:\/\/aembit.io\/wp-content\/uploads\/2024\/11\/grafana-dashboard-english-1024x572.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/aembit-launches-prometheus-metrics-support\/\" class=\"_self cvplbd\" target=\"_self\" >Aembit Launches Prometheus Metrics Support<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/ashur-kanoon\/\" rel=\"author\">Ashur Kanoon<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T19:57:09-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/kubernetes\/' title='Kubernetes' class='pt-cv-tax-kubernetes'>Kubernetes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/product-updates\/' title='Product updates' class='pt-cv-tax-product-updates'>Product updates<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">3 min readEnhance visibility into Aembit Edge deployments with metrics for monitoring performance, detecting anomalies, and integrating with your observability stack. The post Aembit Launches Prometheus Metrics Support appeared first on Aembit ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Aembit&feed_id=1038&blog_url=https:\/\/aembit.io\/\">Aembit<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037136\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/azure-key-vault-tradecraft-with-bark\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Azure Key Vault Tradecraft with BARK\" title=\"\" data-cvpsrc=\"https:\/\/cdn-images-1.medium.com\/max\/1024\/1*7pVorALxcD5w8VnoiCSgDg.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/azure-key-vault-tradecraft-with-bark\/\" class=\"_self cvplbd\" target=\"_self\" >Azure Key Vault Tradecraft with BARK<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/andy-robbins\/\" rel=\"author\">Andy Robbins<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:43:32-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/azure\/' title='azure' class='pt-cv-tax-azure'>azure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cloud-computing\/' title='cloud computing' class='pt-cv-tax-cloud-computing'>cloud computing<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/information-technology\/' title='information-technology' class='pt-cv-tax-information-technology'>information-technology<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BriefThis post details the existing and new functions in BARK that support adversarial tradecraft research relevant to the Azure Key Vault service. The latter part of the post shows an example of ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Posts By SpecterOps Team Members - Medium&feed_id=851&blog_url=https:\/\/posts.specterops.io?source=rss----f05f8696e3cc---4\">Posts By SpecterOps Team Members - Medium<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037400\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/a-platform-engineering-guide-to-managing-secrets-with-akeyless\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"End-to-end Secure GitOps: Akeyless, ArgoCD, &amp; Port.io\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/sBTYmqyMzzg\/hqdefault.jpg\" \/><iframe title=\"End-to-end Secure GitOps: Akeyless, ArgoCD, &amp; Port.io\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/sBTYmqyMzzg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/a-platform-engineering-guide-to-managing-secrets-with-akeyless\/\" class=\"_self cvplbd\" target=\"_self\" >A Platform Engineering Guide to Managing Secrets with Akeyless<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/sam-gabrail\/\" rel=\"author\">Sam Gabrail<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T08:00:00-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/argocd\/' title='ArgoCD' class='pt-cv-tax-argocd'>ArgoCD<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/gitops\/' title='GitOps' class='pt-cv-tax-gitops'>GitOps<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/kubernetes\/' title='Kubernetes' class='pt-cv-tax-kubernetes'>Kubernetes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/platform-engineering\/' title='platform engineering' class='pt-cv-tax-platform-engineering'>platform engineering<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/port-io\/' title='Port.io' class='pt-cv-tax-port-io'>Port.io<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secrets-management\/' title='Secrets Management' class='pt-cv-tax-secrets-management'>Secrets Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security\/' title='security' class='pt-cv-tax-security'>security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Platform engineering equips development teams with efficient and secure workflows to streamline code deployment at scale. This guide explores the essentials of platform engineering, the value of Internal Developer Platforms (IDPs), and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog | Akeyless&feed_id=1039&blog_url=https:\/\/www.akeyless.io\/blog\/\">Blog | Akeyless<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354182\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"2f7aec9abbada737de533e939d64e242\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-1622adcwbe\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cloud Security<\/p>\n","protected":false},"author":6042,"featured_media":1602750,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1354182","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Latest updates on policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security\" \/>\n<meta property=\"og:description\" content=\"Cloud Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:06:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"739\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/cloud-security\/\",\"url\":\"https:\/\/securityboulevard.com\/cloud-security\/\",\"name\":\"Cloud Security - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg\",\"datePublished\":\"2017-07-02T19:38:59+00:00\",\"dateModified\":\"2018-01-11T07:06:23+00:00\",\"description\":\"Latest updates on policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/cloud-security\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg\",\"width\":739,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Security - Security Boulevard","description":"Latest updates on policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security","og_description":"Cloud Security","og_url":"https:\/\/securityboulevard.com\/cloud-security\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:06:23+00:00","og_image":[{"width":739,"height":200,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/cloud-security\/","url":"https:\/\/securityboulevard.com\/cloud-security\/","name":"Cloud Security - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg","datePublished":"2017-07-02T19:38:59+00:00","dateModified":"2018-01-11T07:06:23+00:00","description":"Latest updates on policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/cloud-security\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto25409210-1.jpg","width":739,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-5GhE","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1354182"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354182\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1602750"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1354182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}