Exposed and Unprotected in Cloud Environments
How risky is the cloud? We wanted to know so we asked our security researchers to set up a typical cloud environment with a honeypot included to log attacks. The hundreds of attacks within a few minutes of going live shocked even our veteran researchers.
