• Latest
  • Trending
  • All
  • Trading & Investing
  • Strategies & Techniques
  • Risk Management & Portfolio Allocation
  • Technical Analysis Tools & Indicators
  • Fundamental Analysis & Research
  • Blockchain Technology
  • DeFi & NFTs
Use cloud threat intelligence to protect critical data and assets

Use cloud threat intelligence to protect critical data and assets

April 17, 2024
What happens in crypto today? Daily Crypto News Digest

What happens in crypto today? Daily Crypto News Digest

July 2, 2025
556 million dollars into the inflow of Bitcoin ETF signals is a major shift in investor sentiment

556 million dollars into the inflow of Bitcoin ETF signals is a major shift in investor sentiment

June 12, 2025
Long and short positions in crypto, explained

Long and short positions in crypto, explained

June 11, 2025
SEI pricing forecast 2025: Short-term bearish, long-term bullish?

SEI pricing forecast 2025: Short-term bearish, long-term bullish?

May 29, 2025
Market share of centralized crypto exchanges, according to trading volume

Market share of centralized crypto exchanges, according to trading volume

May 27, 2025
Buyer and Seller Behavior: The Fundamental of Bitcoin Analyze

Buyer and Seller Behavior: The Fundamental of Bitcoin Analyze

May 25, 2025
Тор-10 best crypto indicators to learn

Тор-10 best crypto indicators to learn

May 25, 2025
The Ultimate Crypto Tools Pack – Part 2

The Ultimate Crypto Tools Pack – Part 2

May 24, 2025
Stx bullish recovery to continue

Stx bullish recovery to continue

May 24, 2025
Japan’s central bank digital currency should go big, not go home

Japan’s central bank digital currency should go big, not go home

May 23, 2025
What is it and 5 ways to avoid it

What is it and 5 ways to avoid it

May 23, 2025
X spaces repeat with bluhale

X spaces repeat with bluhale

May 5, 2025
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
Saturday, July 5, 2025
  • Login
UnCirculars
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • Crypto News & Analysis
    • All
    • Adoption & Use Cases
    • Altcoins
    • Bitcoin
    • Market Overview & Trends
    • On-Chain Data & Metrics
    • Security & Scams
    • Technical Analysis & Charting
    What happens in crypto today? Daily Crypto News Digest

    What happens in crypto today? Daily Crypto News Digest

    556 million dollars into the inflow of Bitcoin ETF signals is a major shift in investor sentiment

    556 million dollars into the inflow of Bitcoin ETF signals is a major shift in investor sentiment

    Long and short positions in crypto, explained

    Long and short positions in crypto, explained

    SEI pricing forecast 2025: Short-term bearish, long-term bullish?

    SEI pricing forecast 2025: Short-term bearish, long-term bullish?

    Market share of centralized crypto exchanges, according to trading volume

    Market share of centralized crypto exchanges, according to trading volume

    Buyer and Seller Behavior: The Fundamental of Bitcoin Analyze

    Buyer and Seller Behavior: The Fundamental of Bitcoin Analyze

    Тор-10 best crypto indicators to learn

    Тор-10 best crypto indicators to learn

    The Ultimate Crypto Tools Pack – Part 2

    The Ultimate Crypto Tools Pack – Part 2

    Stx bullish recovery to continue

    Stx bullish recovery to continue

    Japan’s central bank digital currency should go big, not go home

    Japan’s central bank digital currency should go big, not go home

    • Bitcoin
    • Altcoins
    • Market Overview & Trends
    • Technical Analysis & Charting
    • On-Chain Data & Metrics
    • Adoption & Use Cases
    • Security & Scams
    • Opinion & Predictions
  • Blockchain Technology
    • Enterprise Adoption & Applications
    • Supply Chain & Logistics Solutions
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
    • Gaming & Metaverse Infrastructure
    • Web3 Development & Decentralization
    • DAO & Governance Protocols
    • Scalability & Interoperability Solutions
    • Privacy & Security Enhancements
  • Trading & Investing
    • Strategies & Techniques
    • Risk Management & Portfolio Allocation
    • Technical Analysis Tools & Indicators
    • Fundamental Analysis & Research
    • Market Psychology & Sentiment
    • Crypto Tax Implications
    • Institutional Investment Landscape
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
  • Regulation & Policy
    • Global Regulatory Landscape
    • SEC, CFTC, and Government Actions
    • Tax Implications & Reporting
    • KYC/AML Compliance & Standards
    • Institutional Investment Guidelines
    • Central Bank Digital Currencies (CBDCs)
    • Stablecoin Regulation & Oversight
    • Self-Regulatory Organizations (SROs)
  • Security & Scams
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
    • Rug Pulls & Exit Scams
    • Malware & Ransomware Threats:
    • User Education & Best Practices
    • Regulatory Frameworks & Protections
    • Insurance & Recovery Options
  • Community & Culture
    • Crypto Influencers & Thought Leaders
    • Social Media & Online Communities
    • Memes & Internet Culture
    • Crypto Art & Music
    • Events & Conferences
    • Adoption in Developing Countries
  • Opinion & Education
    • Expert Commentaries & Predictions
    • Beginner Guides & Tutorials
    • Glossary of Crypto Terms
    • Research Papers & Whitepapers
    • Podcasts & Video Interviews
    • Book Reviews & Recommendations
No Result
View All Result
UnCirculars
No Result
View All Result
Home Crypto News & Analysis Security & Scams

Use cloud threat intelligence to protect critical data and assets

by Sarah Williams
April 17, 2024
in Security & Scams
0
Use cloud threat intelligence to protect critical data and assets
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter


Many organizations now store more sensitive data and assets in the cloud than on-premises — and attackers have taken notice. Organizations need to know what threats attackers pose in the cloud. One way to stay on top of potential attacks is to use cloud threat intelligence.

Threat intelligence involves the collection, classification and exploitation of knowledge about adversaries. Teams collect security intelligence data from a variety of sources, including logs, security checks, and third-party threat intelligence feeds, and then analyze that data to mitigate risks.

As the cloud becomes more ubiquitous, it must become an integral part of the threat intelligence process. Security engineering and operations teams must dedicate time and resources to developing, gathering and deploying cloud-specific threat intelligence.

Organizations can gather cloud-specific threat intelligence from various external sources, including cloud service providers (CSPs), threat intelligence providers, and managed security service providers.

Strategic and operational cloud threat intelligence

Security teams must develop both strategic and operational threat intelligence. Strategic threat intelligence involves managers and non-technical stakeholders shaping risk management decisions.

Examples of strategic cloud threat intelligence include the following:

Current attack trends and campaigns targeting an existing CSP, such as the Chinese-sponsored attacks that targeted Microsoft in 2022 and 2023. Reputational changes with cloud services that may affect a customer organization. New vulnerabilities or attacks that target specific cloud workloads or service types in use, such as serverless, Kubernetes or containers.

Operational threat intelligence is more tactical in nature. It helps inform security operations center (SOC), threat hunting, DevOps and other technical teams.

Examples of operational threat intelligence include the following:

Specific patterns of attacks against cloud resources, including password spraying, misuse and abuse of API keys and privileged roles, and deployment and operation of cryptocurrency miners in containers. Use of cloud storage and other services to host and distribute malware. CSP logs and event data that may indicate illegal use of resources, unusual access attempts, attempted outbound connection for data exfiltration or command and control, etc.

Key Components of a Cloud Threat Intelligence Program

To effectively implement cloud threat intelligence, organizations need the right team and technologies.

A cloud-focused threat intelligence team should, depending on an organization’s size and capabilities, include the following primary participants:

Cloud architecture and engineering teams. DevOps. Security architecture and engineering. SOC teams. Dedicated threat intelligence or threat hunting teams and roles.

Secondary participants may include internal risk management teams and executive leadership. Third-party analysts can also provide threat intelligence and cloud security insights.

To facilitate building a base of consistent and actionable cloud threat intelligence, organizations should implement and monitor the following technologies:

Cloud log creation and collection services, such as AWS CloudTrail or Amazon CloudWatch, Azure Monitor and Google Cloud Logging. Network flow data collection in any major IaaS cloud. Security services that align with or provide threat intelligence within CSP environments, such as Microsoft Sentinel, Amazon GuardDuty, or Google Cloud Security Command Center. Any workload protection platforms used, such as leading endpoint detection and response tools or cloud-native application protection platforms. Cloud security posture management and cloud access security broker platforms that provide insight and context into both configuration state and interactive cloud behavior.

Security teams must define use cases and develop integration playbooks that make collected data actionable. This helps make informed risk decisions and enables more accurate and targeted threat hunting and response investigations. Building a dashboard of risk changes that is tracked and monitored over time can also help distill cloud threat intelligence into metrics and KPIs for managers.

Dave Shackleford is founder and principal consultant at Voodoo Security; SANS Analyst, Instructor and Course Writer; and GIAC technical director.

Disclaimer for Uncirculars, with a Touch of Personality:

While we love diving into the exciting world of crypto here at Uncirculars, remember that this post, and all our content, is purely for your information and exploration. Think of it as your crypto compass, pointing you in the right direction to do your own research and make informed decisions.

No legal, tax, investment, or financial advice should be inferred from these pixels. We’re not fortune tellers or stockbrokers, just passionate crypto enthusiasts sharing our knowledge.

And just like that rollercoaster ride in your favorite DeFi protocol, past performance isn’t a guarantee of future thrills. The value of crypto assets can be as unpredictable as a moon landing, so buckle up and do your due diligence before taking the plunge.

Ultimately, any crypto adventure you embark on is yours alone. We’re just happy to be your crypto companion, cheering you on from the sidelines (and maybe sharing some snacks along the way). So research, explore, and remember, with a little knowledge and a lot of curiosity, you can navigate the crypto cosmos like a pro!

UnCirculars – Cutting through the noise, delivering unbiased crypto news

Share196Tweet123
Sarah Williams

Sarah Williams

With years of experience dissecting financial markets, Sarah brings clarity and insight to the ever-evolving crypto landscape. Her engaging prose cuts through the noise, keeping you informed about global trends and breaking news.

UnCirculars

Copyright © 2024 UnCirculars

Navigate Site

  • About Us
  • Advertise
  • Terms of Use
  • Disclaimer
  • Privacy Policy
  • Contact Us

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives

Copyright © 2024 UnCirculars