{"id":25231,"date":"2019-02-13T15:48:32","date_gmt":"2019-02-13T15:48:32","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542627"},"modified":"2019-02-13T15:48:32","modified_gmt":"2019-02-13T15:48:32","slug":"the-cloud-in-2019-current-uses-and-emerging-risks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/","title":{"rendered":"The Cloud in 2019: Current Uses and Emerging Risks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"262\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/brafton-1-300x262.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>In the current tech landscape, one would be hard-pressed to find an organization that operates without the help of cloud environments and capabilities. From data storage and document sharing to enabling remote access and communication, the cloud represents the most critical linchpin of today\u2019s IT-focused business processes.<\/p>\n<p>What\u2019s more, the power of the cloud is only continuing to grow. Organizations across every industry are increasing their cloud investments right alongside their migration plans, shifting a rising number of workloads and key applications to off-prem environments. While this certainly bodes well for key cloud benefits like flexibility and productivity, there are some risks to be aware of.<\/p>\n<p>Enterprises aren\u2019t the only ones with their eyes on the cloud \u2013 hackers are attacking these environments more frequently than ever before. As businesses ramp up their cloud initiatives, it\u2019s also imperative that stakeholders keep up with emerging use cases and approaches, as well as the potential threats.<\/p>\n<h2><strong>Current cloud use by the numbers<\/strong><\/h2>\n<p>By now, there\u2019s simply no arguing against the cloud as a requirement for business. According to current industry research and predictions, nearly half of all IT expenditures were devoted to cloud initiatives last year, and by 2020, this will <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/07\/05\/four-trends-in-cloud-computing-cios-should-prepare-for-in-2019\/#3637209f4dc2\">increase to as much as 70 percent<\/a> of all tech spending, Forbes reported.<\/p>\n<p>Let\u2019s take a deeper look at the current cloud market:<\/p>\n<table>\n<tbody readability=\"9.1248927038627\">\n<tr readability=\"18.249785407725\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>There\u2019s considerable growth for all types of cloud architectures, including public, private and hybrid. The worldwide public cloud services sector, in particular, is on track to expand by more than 17 percent in 2019 alone, growing from its <a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/09\/23\/roundup-of-cloud-computing-forecasts-and-market-estimates-2018\/#36e671c8507b\">2018 value of $175.8 billion to $206.2 billion<\/a>, according to statistics gathered by Forbes.<\/li>\n<li>Financial resource allocation on the part of enterprises is growing as well. This year, IT infrastructure-focused spending, including expenditures on things like server, storage and switches, will experience a more than 10 percent year-over-year growth rate, surpassing a value of $52.3 billion this year.<\/li>\n<li>Spending will continue to shift toward cloud initiatives through 2019 and beyond, with over $1.3 trillion in overarching IT spending being impacted by rising cloud allocations by 2022. This includes 22 percent of spending in key enterprise IT markets shifting to the cloud over the next three years, an increase of 9 percent compared to 2018.<\/li>\n<li>SaaS is on the rise as well, with the market now contributing $20 billion to software vendors\u2019 quarterly revenues. These profits are also on track to grow by 32 percent each year.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>A rise in spending signals a few things, including increasing workloads being supported by cloud environments, as well as a more prominent focus on off-prem operations. So how, exactly, are these cloud investments being harnessed this year?<\/p>\n<h2><strong>Cloud usage trends<\/strong><\/h2>\n<p>There are a few trending use cases and cloud-centered approaches coming to light this year. These include emerging initiatives like:<\/p>\n<table>\n<tbody readability=\"10\">\n<tr readability=\"20\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li><strong>Increasing use of cloud services across the board:<\/strong> While this may seem obvious, it\u2019s important to understand that critical role that cloud services, including SaaS, PaaS and IaaS, now play in enterprise infrastructure. As Forbes Technology Council\u2019s Asokan Ashok noted, usage of these cloud-based, as-a-service offerings will experience \u201can explosion\u201d over the next few years, with the SaaS market on track to grow 18 percent by 2020, and rising investments in PaaS offerings making it the fastest growing sector of cloud solutions currently. Finally, the IaaS market is forecast to reach $72.4 billion by 2020, signaling the fact that more enterprises are jumping on board with subscription cloud solutions.<\/li>\n<li><strong>Hybrid continues to grow:<\/strong> While there are certainly key use cases centered around purely public or private environments, 2019 will continue to rising investments in hybrid cloud solutions that can offer the best of both. This is particularly true for businesses that are still getting up and running with their cloud infrastructures. \u201cMaking a full transition to the cloud has proved more challenging than anticipated. So here is where hybrid cloud solutions will play an important role,\u201d Ashok wrote.<\/li>\n<li><strong>Cloud security become more imperative \u2013 and more complex:<\/strong> As enterprises continue to make more investments in cloud solutions, stakeholders\u2019 focus on end-to-end security must increase as well. At the same time, though, emerging threats and new security standards like the EU\u2019s General Data Protection Regulation are making cloud security more complex than before.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Key cloud threats<\/strong><\/h2>\n<p>While cloud-focused malware samples are certainly nothing new, there are a few dangerous threats poised to impact enterprise cloud usage this year.<\/p>\n<p>As RedLock contributor Michael Higashi noted, one issue that\u2019s continuing to create vulnerabilities for enterprise cloud environments are insecure account credentials and other insider threats. Shadow IT continues to pose an issue, and this combined with a critical lack of insight into cloud operations can compound the overall threat. Higashi reported that only <a href=\"https:\/\/redlock.io\/blog\/13-cloud-security-statistics-to-know-in-2019-with-9-best-practices\">7 percent of businesses<\/a> can say they have \u201cgood\u201d visibility across their cloud-based data, and the vast majority of successful breaches \u2013 80 percent \u2013 rely on the use of privileged account credentials.<\/p>\n<p>In addition, inconsistent patching can create additional holes for malicious actors and other threats to slip through the cracks. One RedLock study found that nearly one-quarter of all businesses leverage cloud hosts that lack the proper high-priority security patches in public cloud environments.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-trend-toward-cryptojacking-what-it-is-and-how-businesses-can-prevent-it\/\">Cryptojacking<\/a> is also threatening cloud platforms and resources across industry sectors. While this threat may not appear as malicious at first glance, the unauthorized use of considerable resources required to support cryptocurrency mining can severely impact performance levels, impeding legitimate user processes.<\/p>\n<h2><strong>Cloud security in 2019<\/strong><\/h2>\n<p>Given current across-the-board cloud usage \u2013 which is only on the rise \u2013 alongside the increasing threats to cloud-based platforms, there are a few key security processes that enterprises should be sure are in place.<\/p>\n<p>As statistics show, simple passwords are no longer enough to safeguard key accounts. Wherever possible, IT stakeholders should ensure that two-factor authentication is\u00a0in place to reduce the chances of compromised credentials and a successful breach.<\/p>\n<p>In addition, security leaders should utilize advanced monitoring to ensure they have the proper insight into the cloud architectures, access and usage. It\u2019s important to regularly take stock of the cloud apps employees are using in order to prevent shadow IT and reduce holes in the business\u2019s security posture.<\/p>\n<p>Finally, it\u2019s critical for enterprises to have innovative and intelligent security solutions in place to safeguard the cloud apps that they use the most. <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html\">Trend Micro\u2019s Hybrid Cloud Security solution<\/a>\u00a0helps uncomplicate cloud security while providing you with the high-level visibility needed to manage your on-site and cloud environments.<\/p>\n<p>To find out more about securing your cloud infrastructure connect with us about adding <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/business\/products\/hybrid-cloud\/sb_hybrid_cloud_security.pdf\">Hybrid Cloud Security<\/a> today.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/the-cloud-in-2019-current-uses-and-emerging-risks\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the current tech landscape, one would be hard-pressed to find an organization that operates without the help of cloud environments and capabilities. From data storage and document sharing to enabling remote access and communication, the cloud represents the most critical linchpin of today&#8217;s IT-focused business processes. What&#8217;s more, the power of the cloud is&#8230;<br \/>\nThe post The Cloud in 2019: Current Uses and Emerging Risks appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25232,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[5310,1252,5826,4846,5827,5828,1283,311,307],"class_list":["post-25231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-advanced-persistent-threats","tag-cloud","tag-cloud-app-security","tag-cloud-computing-security","tag-cloud-data-protection","tag-cloud-threats","tag-cryptojacking","tag-current-news","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Cloud in 2019: Current Uses and Emerging Risks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cloud in 2019: Current Uses and Emerging Risks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-13T15:48:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"262\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Cloud in 2019: Current Uses and Emerging Risks\",\"datePublished\":\"2019-02-13T15:48:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/\"},\"wordCount\":1090,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg\",\"keywords\":[\"advanced persistent threats\",\"cloud\",\"Cloud App Security\",\"cloud computing security\",\"cloud data protection\",\"cloud threats\",\"cryptojacking\",\"Current News\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/\",\"name\":\"The Cloud in 2019: Current Uses and Emerging Risks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg\",\"datePublished\":\"2019-02-13T15:48:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg\",\"width\":300,\"height\":262},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cloud-in-2019-current-uses-and-emerging-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"advanced persistent threats\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/advanced-persistent-threats\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Cloud in 2019: Current Uses and Emerging Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cloud in 2019: Current Uses and Emerging Risks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/","og_locale":"en_US","og_type":"article","og_title":"The Cloud in 2019: Current Uses and Emerging Risks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-13T15:48:32+00:00","og_image":[{"width":300,"height":262,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Cloud in 2019: Current Uses and Emerging Risks","datePublished":"2019-02-13T15:48:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/"},"wordCount":1090,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg","keywords":["advanced persistent threats","cloud","Cloud App Security","cloud computing security","cloud data protection","cloud threats","cryptojacking","Current News","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/","url":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/","name":"The Cloud in 2019: Current Uses and Emerging Risks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg","datePublished":"2019-02-13T15:48:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/the-cloud-in-2019-current-uses-and-emerging-risks.jpg","width":300,"height":262},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-cloud-in-2019-current-uses-and-emerging-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"advanced persistent threats","item":"https:\/\/www.threatshub.org\/blog\/tag\/advanced-persistent-threats\/"},{"@type":"ListItem","position":3,"name":"The Cloud in 2019: Current Uses and Emerging Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25231"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25231\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25232"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}