{"id":26728,"date":"2024-07-25T16:28:43","date_gmt":"2024-07-25T16:28:43","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=26728"},"modified":"2024-09-23T14:32:33","modified_gmt":"2024-09-23T14:32:33","slug":"cloud-resources-have-become-the-primary-target-of-cyberattacks","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/","title":{"rendered":"Cloud Resources Have Become the Primary Target of Cyberattacks"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/melisa-osores\">Melisa Osores<\/a>, Managing Editor for Latin America at Computer Weekly<\/p>\n\n\n\n<p>Originally published in <a href=\"https:\/\/www.computerweekly.com\/es\/noticias\/366591981\/Los-recursos-en-la-nube-se-han-convertido-en-el-principal-objetivo-de-ciberataques\">Computer Weekly<\/a><\/p>\n\n\n\n<p><a><\/a><strong>According to research by Thales, 44% of all organizations have experienced a cloud data breach, and nearly half (47%) of corporate data stored in the cloud is sensitive data.<\/strong><strong><\/strong><\/p>\n\n\n\n<p>As cloud use remains strategically vital for many organizations, cloud resources <a href=\"https:\/\/www.computerweekly.com\/es\/cronica\/Crecen-los-usos-y-la-necesidad-de-seguridad-de-la-nube-empresarial?_gl=1*1g902t7*_ga*MTAzMzIyNzQ4NS4xNjk3MTI5MTkw*_ga_TQKE4GS5P9*MTcxOTUxMDg2Mi4yNDUuMS4xNzE5NTEwODcwLjAuMC4w\" target=\"_blank\" rel=\"noreferrer noopener\">have become the primary target<\/a> of cyberattacks, with 31% of attacks prioritizing SaaS applications, 30% cloud storage, and 26% cloud management infrastructure. As a result, protecting cloud environments has become the top security priority, ahead of all other security disciplines. These numbers were presented in the Thales \u201c<a href=\"https:\/\/cpl.thalesgroup.com\/cloud-security-research\" target=\"_blank\" rel=\"noreferrer noopener\">2024 Cloud Security Study<\/a>,\u201d which was based on a survey of almost 3,000 IT and security professionals in 18 countries across 37 industries.<\/p>\n\n\n\n<p>The study showed that organizations <a href=\"https:\/\/www.computerweekly.com\/es\/noticias\/366582612\/El-uso-de-multiples-nubes-aumenta-la-complejidad-de-la-ciberseguridad?_gl=1*1o1pq75*_ga*MTAzMzIyNzQ4NS4xNjk3MTI5MTkw*_ga_TQKE4GS5P9*MTcxOTUxMDg2Mi4yNDUuMS4xNzE5NTEwODcwLjAuMC4w\" target=\"_blank\" rel=\"noreferrer noopener\">continue to face cloud data breaches<\/a>: 44% reported having experienced a cloud data breach, and 14% reported a breach in the past 12 months. Human error and misconfiguration remain the leading causes of these breaches (31%), ahead of known vulnerability exploits (28%) and failure to implement multi-factor authentication (17%).<\/p>\n\n\n\n<p>The growing use of the cloud in enterprises has increased the potential attack surface for malicious actors, as 66% of organizations use more than 25 SaaS applications and nearly half (47%) of data in the cloud is sensitive. Despite <a href=\"https:\/\/www.computerweekly.com\/es\/opinion\/Tres-preguntas-para-los-CISO-sobre-la-postura-de-seguridad-en-la-nube?_gl=1*1o1pq75*_ga*MTAzMzIyNzQ4NS4xNjk3MTI5MTkw*_ga_TQKE4GS5P9*MTcxOTUxMDg2Mi4yNDUuMS4xNzE5NTEwODcwLjAuMC4w\" target=\"_blank\" rel=\"noreferrer noopener\">increasing risks to sensitive cloud data<\/a>, encryption rates remain low, with less than 10% of enterprises encrypting 80% or more of their cloud data.<\/p>\n\n\n\n<p>\u201cThe scalability and flexibility offered by the cloud are extremely attractive to organizations, so it is no surprise that it is a fundamental element of their security strategies. However, as the cloud attack surface expands, organizations <a href=\"https:\/\/www.computerweekly.com\/es\/cronica\/Novedades-y-desafios-de-seguridad-en-los-servicios-empresariales-en-la-nube\" target=\"_blank\" rel=\"noreferrer noopener\">must get a firm grasp on the data they have stored in the cloud<\/a>, the keys they are using to encrypt it, and the ability to have complete visibility into who is accessing the data and how it is being used. Solving these challenges now is vital, especially considering that data sovereignty and privacy emerged as top concerns in this year&#8217;s study,\u201d said Sebastien Cano, Senior Vice President of Thales Cloud Protection and Licensing.<\/p>\n\n\n\n<p>As organizations gain <a href=\"https:\/\/www.computerweekly.com\/es\/ehandbook\/Guia-Esencial-Seguridad-en-la-Nube\" target=\"_blank\" rel=\"noreferrer noopener\">more experience with cloud computing<\/a>, many are updating their investments to meet new security challenges. For organizations that prioritized digital sovereignty as an emerging security concern, refactoring applications to logically segment, secure, store, and process data in the cloud was the top-cited method for achieving digital sovereignty, ahead of other measures, such as repatriating workloads on premises or in the territory. Future-proofing cloud environments (31%) was mentioned as the number one driver for digital sovereignty initiatives, while regulatory compliance was a distant second at 22%.<\/p>\n\n\n\n<p>For more information, watch the <a href=\"https:\/\/cpl.thalesgroup.com\/resources\/webinars?commid=615147&amp;bt_tok=%7b%7bRecipient.ID%7d%7d\" target=\"_blank\" rel=\"noreferrer noopener\">Thales S&amp;P Global webinar<\/a>, presented by Scott Crawford, Information Security Research Head, and Justin Lam, Research Analyst.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Melisa Osores, Managing Editor for Latin America at Computer Weekly Originally published in Computer Weekly According to research by Thales, 44% of all organizations have experienced a cloud data breach, and nearly half (47%) of corporate data stored in the cloud is sensitive data. As cloud use remains strategically vital for many organizations, cloud [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":26721,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1509],"tipo_autor":[1455],"class_list":["post-26728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-melisa-osores-en","tipo_autor-colaborador"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Cloud Resources Have Become the Primary Target of Cyberattacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Cloud Resources Have Become the Primary Target of Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"By Melisa Osores, Managing Editor for Latin America at Computer Weekly Originally published in Computer Weekly According to research by Thales, 44% of all organizations have experienced a cloud data breach, and nearly half (47%) of corporate data stored in the cloud is sensitive data. As cloud use remains strategically vital for many organizations, cloud [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-25T16:28:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-23T14:32:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Cloud Resources Have Become the Primary Target of Cyberattacks\",\"datePublished\":\"2024-07-25T16:28:43+00:00\",\"dateModified\":\"2024-09-23T14:32:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\",\"name\":\"LACNIC Blog | Cloud Resources Have Become the Primary Target of Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png\",\"datePublished\":\"2024-07-25T16:28:43+00:00\",\"dateModified\":\"2024-09-23T14:32:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Resources Have Become the Primary Target of Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Cloud Resources Have Become the Primary Target of Cyberattacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Cloud Resources Have Become the Primary Target of Cyberattacks","og_description":"By Melisa Osores, Managing Editor for Latin America at Computer Weekly Originally published in Computer Weekly According to research by Thales, 44% of all organizations have experienced a cloud data breach, and nearly half (47%) of corporate data stored in the cloud is sensitive data. As cloud use remains strategically vital for many organizations, cloud [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-07-25T16:28:43+00:00","article_modified_time":"2024-09-23T14:32:33+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Cloud Resources Have Become the Primary Target of Cyberattacks","datePublished":"2024-07-25T16:28:43+00:00","dateModified":"2024-09-23T14:32:33+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/","url":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/","name":"LACNIC Blog | Cloud Resources Have Become the Primary Target of Cyberattacks","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png","datePublished":"2024-07-25T16:28:43+00:00","dateModified":"2024-09-23T14:32:33+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/cloud-resources-have-become-the-primary-target-of-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud Resources Have Become the Primary Target of Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/07\/cloudcomputing-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":26719,"post_title":"Los recursos en la nube se han convertido en el principal objetivo de ciberataques","slug":"los-recursos-en-la-nube-se-han-convertido-en-el-principal-objetivo-de-ciberataques","href":"https:\/\/blog.lacnic.net\/los-recursos-en-la-nube-se-han-convertido-en-el-principal-objetivo-de-ciberataques\/"},{"locale":"pt_BR","id":26730,"post_title":"Os recursos da nuvem se tornaram o principal alvo dos ataques cibern\u00e9ticos","slug":"os-recursos-da-nuvem-se-tornaram-o-principal-alvo-dos-ataques-ciberneticos","href":"https:\/\/blog.lacnic.net\/pt-br\/os-recursos-da-nuvem-se-tornaram-o-principal-alvo-dos-ataques-ciberneticos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=26728"}],"version-history":[{"count":4,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26728\/revisions"}],"predecessor-version":[{"id":27270,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/26728\/revisions\/27270"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/26721"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=26728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=26728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=26728"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=26728"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=26728"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=26728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}