{"id":133,"date":"2020-01-25T07:42:56","date_gmt":"2020-01-25T07:42:56","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=133"},"modified":"2020-02-05T08:25:21","modified_gmt":"2020-02-05T08:25:21","slug":"mitigating-cloud-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/mitigating-cloud-vulnerabilities\/","title":{"rendered":"Mitigating Cloud Vulnerabilities"},"content":{"rendered":"\n<p>While careful cloud adoption can enhance an organization\u2019s security posture, cloud services can introduce risks that organizations should understand and address both during the procurement process and while operating in the cloud. Fully evaluating securityimplications when shifting resources to the cloud will help ensure continued resource availability and reduce risk of sensitive informationexposures. To implement effective mitigations, organizations should consider cyber risks to cloud resources, just as they would in an on-premises environment. <a href=\"https:\/\/media.defense.gov\/2020\/Jan\/22\/2002237484\/-1\/-1\/0\/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed    solutions to automated, manage threat intelligence, forensic    investigations and cyber security training. Our objective is to support    organisations and consumers at every step of their cyber maturity    journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>While careful cloud adoption can enhance an organization\u2019s security posture, cloud services can introduce risks that organizations should understand and address both during the procurement process and while operating in the cloud. Fully evaluating securityimplications when shifting resources to the cloud will help ensure continued resource availability and reduce risk of sensitive informationexposures. To implement &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/mitigating-cloud-vulnerabilities\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Mitigating Cloud Vulnerabilities&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[11],"tags":[],"class_list":["post-133","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/133\/revisions"}],"predecessor-version":[{"id":155,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/133\/revisions\/155"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}