This surface has grown exponentially with the rise of things like remote working and even hybrid working , where users login to the company cloud from a work device , at home , on their own network and with all the uncontrolled security environments that entails .
The extensive connectivity and data storage capabilities of the cloud make it an appealing target for cybercriminals .
“ Identities in particular are a key threat in cloud environments given they are the keys to accessing these resources ,” elaborates Bernard . “ If compromised ,
“ Identities in particular are a key threat in cloud environments given they are the keys to accessing these resources ”
BERNARD MONTEL EMEA TECHNICAL DIRECTOR AND SECURITY STRATEGIST , TENABLE cybermagazine . com 85