Ten Vulnerabilities that Impact Enterprise Cloud Apps

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten Vulnerabilities that Impact Enterprise Cloud Apps-4 Next

Database Injections

Vulnerabilities that enable attackers to inject other database code into an app: Even apps that don't use SQL can suffer from injection attacks. An example of this is the MongoDB Hash Injection, in which the use of Web application framework Ruby on Rails in conjunction with MongoDB can lead to attackers bypassing authentication, exfiltrating data and even launch denial-of-service attacks.

On August 6, Russian hackers announced they had stolen more than one billion usernames and password combinations, along with accompanying email addresses -- a big grab, considering that there are nearly three billion Internet users. By that estimation, up to one-third of Internet users may be vulnerable to data loss. The breach is a poignant reminder for individual users and enterprises alike to take a look at how they're protecting their personally identifiable information (more commonly referred to as PII).

Cisco recently predicted that there will be 21 billion Internet devices in use by 2018, and a recent survey from Netskope shows that most enterprises use an average of 508 cloud apps across an average of three devices per user. Both of these statistics underscore the dizzying number of usernames, passwords, and email addresses that are used across a myriad of devices and apps, a trend that only looks to continue for the foreseeable future. Organizations today are already relying heavily on cloud apps to help improve productivity and reduce operating costs, and as security standards continue to improve, businesses are becoming increasingly comfortable storing business-critical data in the cloud.

However, with increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network.

There are four broad categories of vulnerabilities in cloud apps: components, code, design, and configuration. This slideshow features 10 types of vulnerabilities, identified by Ravi Balupari, senior manager, Cloud Security Research and Content Development at Netskope, that fall into these respective categories, and a brief overview of how they impact enterprise cloud apps.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.