Protect Against Russia-Ukraine Cyber Activity
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Consulting
  • More
  • AU
    Language
  • Contact Us
  • Resources
  • Get support
  • Get Started

Cloudy with a Chance of Entropy

  • Download
Dec 17, 2019 at 09:00 AM

In the first half of 2019, there were 21 headline-grabbing incidents involving public cloud platforms. Unfortunately, consumers of IaaS and PaaS cloud services continue to struggle with getting the basics of security right. 

If there is one thing the Cloud service providers (CSPs) have done extremely well, it's innovate. Unfortunately, this torrent of new, innovative features, often released on a near daily basis, has led to exponentially more complexity. And while many IT and security organizations conceptually understand the shared responsibility model, our research shows there is a breakdown when putting this concept into practice. 

This report highlights key learnings from these incidents and presents original research from the cloud-focused division of the Unit 42 threat research team. The data showcased in this report is designed to empower your business with the required security knowledge, tools and best practices to fulfill your role in the shared responsibility model and protect your modern apps and workloads in the cloud against increasingly pervasive threats.


White Paper

The Business Case for Cloud Threat Defense

Read this report for an understanding of how RedLock can reduce financial risks due to security breaches, third-party tools and labor requirements to resolve issues faster; provide security governance and increase cross-team visibility such as asset management; and easily generate compliance reports that map and provide audit trails for your cloud resources.

December 17, 2019
  • 107

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube

Copyright © 2022 Palo Alto Networks. All rights reserved