Essential cloud security

Cloud Scanning

The essential guide to start your cloud security journey.

Getting started with cloud security

6 min read

What Is Cloud Scanning, and Why Does it Matter?

Cloud scanning emerges as the critical solution to secure the ephemeral world of cloud computing, empowering security teams to navigate...

Shrikant Dhanawade
Feb 11, 2025
7 min read

Securing Dynamic Cloud Environments: Best Practices for Comprehensive Scanning

Traditional approaches to vulnerability scanning are no longer sufficient to secure the increasing complexity of dynamic cloud environments. While vulnerability...

Shrikant Dhanawade
Feb 18, 2025
9 min read

The State of Cloud and SaaS Security Report

The rapid adoption of cloud services and containerized applications has progressed unabated. See what more than 100 security and IT...

Dark Reading Research
Jan 28, 2025

Here are the most common cloud security issues. How many do you have?

45%

Misconfigured AWS Resources (Primarily RDS, Amazon Aurora, API Gateway)

70%

Misconfigured Azure Resources (Primarily Storage Account, Disks, WebApps)

63%

Misconfigured GCP Resources (Primarily Kubernetes Cluster, PostgreSQL, Storage, MySQL)

360K+

Public virtual machines (VMs) with no encryption on attached EBS volumes

50K+

Public VMs with destructive data permissions

15M

VMs with high and critical vulnerabilities

1M+

VMs led to privilege escalation

99%

VMs non-compliant with control for MFA delete on critical S3 buckets

3.9M+

VMs led to potential lateral movement

3M

VMs with at least one public exploit

14.7%

Vulnerabilities have public exploit with remote code execution (RCE)

98%

VMs non-compliant with control requiring monitoring of AWS organization changes

Source: Anonymized data from 44 million cloud VMs assessed by the Qualys Threat Research Unit in 2024.

Dive in with more cloud scanning articles

Blog
How Exposed Docker Daemon Ports Open the Door to Malware — and What You Can Do to Stop It

As cryptocurrency prices continue to rise, cybercriminals increasingly leverage crypto mining as a fast and lucrative way to exploit...

Amit Gadhave
Added,Mar 29, 2025
Blog
Strengthening Cloud Security: Mapping the Cloud Controls Matrix (CCM) 4.0 to PCI DSS 4.0

PCI DSS 4.0 - No More Exceptions for Cloud Security

Starting in 2025, Cloud Service Providers (CSPs) will...

Cloud Security Alliance
Added,Mar 20, 2025
Blog
Do I need Kubernetes?

As Kubernetes cements itself as the backbone of modern cloud environments, security practitioners need to understand not just the...

Dave Blakey
Added,Mar 12, 2025
Blog
Kubernetes Multi-Cloud Multi-Cluster Strategy Overview

This article from James Walker, founder of Heron Web, helps the reader develop a multi-cloud, multi-cluster Kubernetes strategy by...

James Walker
Added,Mar 6, 2025
Video
Adoption of CIS Benchmarks™ to Enhance Your Cloud Security

Explore how CIS Benchmarks™ can help harden your multi-cloud environments in this informative session. Learn practical strategies for implementing...

Sean Atkinson
Added,Feb 27, 2025
Video
Decoding Cloud Security Risks: A Fireside Chat with CSA's Jim Reavis & Qualys' Sumedh Thakar

In this dynamic fireside chat Jim Reavis, CEO of the Cloud Security Alliance, and Sumedh Thakar, CEO of Qualys....

Qualys & CSA
Added,Feb 27, 2025

Get a personalized custom assessment

No-cost Report

See all your cloud vulnerabilities for free today.