Essential cloud security

Cloud Scanning

The essential guide to start your cloud security journey.

Getting started with cloud security

6 min read

What Is Cloud Scanning, and Why Does it Matter?

Cloud scanning emerges as the critical solution to secure the ephemeral world of cloud computing, empowering security teams to navigate...

Shrikant Dhanawade
Feb 11, 2025
7 min read

Securing Dynamic Cloud Environments: Best Practices for Comprehensive Scanning

Traditional approaches to vulnerability scanning are no longer sufficient to secure the increasing complexity of dynamic cloud environments. While vulnerability...

Shrikant Dhanawade
Feb 18, 2025
9 min read

The State of Cloud and SaaS Security Report

The rapid adoption of cloud services and containerized applications has progressed unabated. See what more than 100 security and IT...

Dark Reading Research
Jan 28, 2025

Here are the most common cloud security issues. How many do you have?

45%

Misconfigured AWS Resources (Primarily RDS, Amazon Aurora, API Gateway)

70%

Misconfigured Azure Resources (Primarily Storage Account, Disks, WebApps)

63%

Misconfigured GCP Resources (Primarily Kubernetes Cluster, PostgreSQL, Storage, MySQL)

360K+

Public virtual machines (VMs) with no encryption on attached EBS volumes

50K+

Public VMs with destructive data permissions

15M

VMs with high and critical vulnerabilities

1M+

VMs led to privilege escalation

99%

VMs non-compliant with control for MFA delete on critical S3 buckets

3.9M+

VMs led to potential lateral movement

3M

VMs with at least one public exploit

14.7%

Vulnerabilities have public exploit with remote code execution (RCE)

98%

VMs non-compliant with control requiring monitoring of AWS organization changes

Source: Anonymized data from 44 million cloud VMs assessed by the Qualys Threat Research Unit in 2024.

Dive in with more cloud scanning articles

Video
Cloud Security 101

Looking to understand how to harness the power of cloud security? This webinar will provide a deep dive into...

Rob Smith
Added,Apr 18, 2025
Video
New to Containers? Learn How to Secure Them

As organizations adopt containers, understanding the risks that come with this modern architecture is critical. This short video from...

IBM
Added,Apr 11, 2025
Blog
Ingress vuln

Ingress-NGINX is one of the most widely used ingress controllers in Kubernetes environments. Recent vulnerabilities discovered in its annotations...

Diksha Ojha
Added,Apr 7, 2025
Blog
How Exposed Docker Daemon Ports Open the Door to Malware — and What You Can Do to Stop It

Unsecured Docker ports can expose systems to crypto - mining malware. Learn how attackers exploit them and how to...

Amit Gadhave
Added,Mar 29, 2025
Blog
Strengthening Cloud Security: Mapping the Cloud Controls Matrix (CCM) 4.0 to PCI DSS 4.0

PCI DSS 4.0 - No More Exceptions for Cloud Security

Starting in 2025, Cloud Service Providers (CSPs) will...

Cloud Security Alliance
Added,Mar 20, 2025
Blog
Do I need Kubernetes?

As Kubernetes cements itself as the backbone of modern cloud environments, security practitioners need to understand not just the...

Dave Blakey
Added,Mar 12, 2025

Get a personalized custom assessment

No-cost Report

See all your cloud vulnerabilities for free today.