{"id":32806,"date":"2020-01-16T15:50:00","date_gmt":"2020-01-16T15:50:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/"},"modified":"2020-01-16T15:50:00","modified_gmt":"2020-01-16T15:50:00","slug":"why-multicloud-security-is-your-next-big-challenge","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/","title":{"rendered":"Why multicloud security is your next big challenge"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/02\/multicloud-100788234-large.3x2.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"teaser\">\n<p>Most companies who use cloud services to deploy applications, websites, databases and related solutions have a problem.<\/p>\n<p>While each cloud vendor may have a secure solution for their own cloud service and offer a rich set of security tools to its customers, how can companies ensure that they are protected across all the different boundaries of cloud implementations they employ? This is especially important if they don\u2019t want to implement multiple independent security mechanisms, or have to deal with security logs and data flows that are incompatible?<\/p>\n<h2><strong>Managing multiple cloud service (and your legacy data center products)<\/strong><\/h2>\n<p>Why is this an issue? Because the average company has three-five different instances of cloud services deployed in their business\u2013 from public cloud to private cloud to hybrid cloud, to on-prem cloud &#8212; in addition to legacy data center implementations. All of these have their own way of protecting the organization from malware, data exfiltration and more general attacks. And with increased emphasis on regulatory compliance requirements, the capability to manage all these disparate systems is crucial.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Related:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3437042\/cloud-security-inside-the-shared-responsibility-model.html\">Cloud security: Inside the shared responsibility model<\/a> ]<\/h4>\n<\/aside>\n<p>Although I estimate that about 50 to -60 percent of companies have implemented a SIEM (security Information and event management) solution, which in theory &#8230;..<\/p>\n<p><em>Log in or subscribe to Insider Pro to read the rest of this analysis and all of <a href=\"https:\/\/www.idginsiderpro.com\/author\/Jack-Gold\/\">Jack Gold&#8217;s columns<\/a>.<\/em><\/p>\n<\/p><\/div>\n<div class=\"premium\">\n<p>Most companies who use cloud services to deploy applications, websites, databases and related solutions have a problem.<\/p>\n<p>While each cloud vendor may have a secure solution for their own cloud service and offer a rich set of security tools to its customers, how can companies ensure that they are protected across all the different boundaries of cloud implementations they employ? This is especially important if they don\u2019t want to implement multiple independent security mechanisms, or have to deal with security logs and data flows that are incompatible?<\/p>\n<h2><strong>Managing multiple cloud service (and your legacy data center products)<\/strong><\/h2>\n<p>Why is this an issue? Because the average company has three-five different instances of cloud services deployed in their business\u2013 from public cloud to private cloud to hybrid cloud, to on-prem cloud &#8212; in addition to legacy data center implementations. All of these have their own way of protecting the organization from malware, data exfiltration and more general attacks. And with increased emphasis on regulatory compliance requirements, the capability to manage all these disparate systems is crucial.<\/p>\n<aside class=\"fakesidebar\">\n<aside class=\"fakesidebar\">\n<h4><strong>[ Related:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3437042\/cloud-security-inside-the-shared-responsibility-model.html\">Cloud security: Inside the shared responsibility model<\/a> ]<\/h4>\n<\/aside>\n<\/aside>\n<p>Although I estimate that about 50 to -60 percent of companies have implemented a SIEM (security Information and event management) solution, which in theory aggregates threat intelligence information from a variety of sources (data center, network routers, end points, cloud servers and so on), it may or may not be fully integrated with each instance of cloud in a multi-cloud environment. In fact, we\u2019ve seen organizations that rely on the available public cloud threat detection infrastructure by itself, rather than even try to integrate with a complete SIEM solution.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Related:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3431152\/where-in-the-cloud-is-it-headed.html\">Where in the cloud is IT headed?<\/a>&nbsp;]<\/h4>\n<\/aside>\n<p>That practice essentially makes each cloud instance a standalone threat management system and requires the security group to monitor multiple information sources to see if they are under attack. Further, it\u2019s quite possible that a particular SIEM does not support the APIs for a particular cloud instance that companies are using. And what should companies that have not implemented a SIEM system do to manage their security? At best this is a messy situation, and at worst, it can expose companies to unneeded security risks present within the gaps.<\/p>\n<h2><strong>So many cloud services, so many security threats<\/strong><\/h2>\n<p>With so many corporate cloud service providers working with enterprises (e.g., AWS, Google Cloud, Microsoft Azure, Oracle, IBM, SAP, Alibaba, Baidu, Tencent and so on.), it is imperative that organizations find a way to share relevant security-oriented data from each and aggregate\/consolidate that information into a single system that can fully collect and analyze a complete set of all data, and then identify and pinpoint any security breaches in the total enterprise environment.<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Don&#8217;t miss:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/author\/Jack-Gold\/\">Industry analyst Jack Gold on Insider Pro<\/a> ]<\/h4>\n<\/aside>\n<p>This sounds simple enough, but is no easy task given the complexity of interactions and the variety of data and network interactions taking place, not to mention that many SIEMs are very difficult to use for data analysis purposes and many companies fall back to simple alerts which are important but not sufficient.<\/p>\n<p>So how does an enterprise extract data from multiple cloud environments and analyze the necessary data from their SIEM (e.g., Splunk, McAfee, IBM, HP, RSA and others)?<\/p>\n<p>One approach to combating this complexity and siloed approach to security is the Open Cyber Security Alliance. Its stated goal (from its website) is to bring \u201ctogether vendors and end users in an open cybersecurity ecosystem where products can freely exchange information, insights, analytics and orchestrated response. The OCA supports commonly developed code and tooling and the use of mutually agreed upon technologies, data standards, and procedures.\u201d<\/p>\n<aside class=\"fakesidebar\">\n<h4><strong>[ Security ebook:<\/strong> <a href=\"https:\/\/www.idginsiderpro.com\/article\/3408337\/guide-to-top-security-certifications.html\">Guide to top security certification<\/a> ]<\/h4>\n<\/aside>\n<p>While this is a generic open sourced security data sharing group, it may have multiple longer-term ramifications not only with stand alone systems, but with cloud-based systems as well. In the mean time, various cloud vendors are taking their own approach while the open systems work plays out over the next 1-2 years or more.<\/p>\n<h2><strong>How IBM, Microsoft and Google approach cloud security<\/strong><\/h2>\n<p>One example of how a multicloud environment for security may be implemented is the IBM Cloud Pak for Security. IBM\u2019s approach is to pre-package a solution that has built-in integrations with the leading cloud platforms and SIEM tools (e.g., Splunk, AWS, Azure, Google Cloud, McAfee or others). It uses Red Hat\u2019s Open Shift platform. Open Shift allows interconnections to almost any Linux environment and includes nearly all cloud-based systems. But IBM\u2019s approach still requires connectors to be built to clouds and security tools, and if you need one not currently supported, IBM services will need to build it for you.<\/p>\n<aside class=\"fakesidebar\">\n<h4>[ Skills and training: <a href=\"https:\/\/www.idginsiderpro.com\/article\/3444564\/29-top-cloud-certifications.html\">29 top cloud certifications<\/a> ]<\/h4>\n<\/aside>\n<p>Microsoft also wants to be your primary cross-cloud provider of security services, but has a more disjointed approach with its myriad of security products. Unlike IBM that is trying to merge all of its products into a single package, Microsoft has a number of distinct products like Azure Security Center, Microsoft Application Security Services, and Microsoft Cloud App Security (A Cloud App Security Broker, or CASB). This raises the complexity of security management.<\/p>\n<p>For its part, Google Cloud tends to have much greater focus on its own security than trying to integrate across all different cloud platforms. It has a rich set of tools that cover infrastructure security, network security, endpoint security (primarily Chromebooks), data security and Identity and Access management (IAM). It does have some cross platform capability, but it needs to do more.<\/p>\n<p><strong>Bottom line<\/strong>: For most organizations, it\u2019s going to remain a multicloud, multi-vendor world for the foreseeable future. The question is, will the security models of all the leading vendors merge to allow companies to take advantage of a single pain of glass to manage all aspects of security and enable better threat management and analytics?<\/p>\n<p>Until we get to a fully compatible, industry standard way of interacting with all of the security mechanisms inherent in the various clouds, the answer is no. But I expect within the next two to three years, we\u2019ll see a vast improvement in data sharing and standard interfaces across cloud and security vendors that will make the job of security much easier for most organizations.<\/p>\n<\/div>\n<p> READ MORE <a href=\"https:\/\/www.idginsiderpro.com\/article\/3514669\/why-multicloud-security-is-your-next-big-challenge.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32807,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1253,536,812,1736,7780,7047,800,307],"class_list":["post-32806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-computing","tag-cloud-security","tag-data-center","tag-hybrid-cloud","tag-it-strategy","tag-private-cloud","tag-public-cloud","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why multicloud security is your next big challenge 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why multicloud security is your next big challenge 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-16T15:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why multicloud security is your next big challenge\",\"datePublished\":\"2020-01-16T15:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\"},\"wordCount\":1287,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg\",\"keywords\":[\"cloud computing\",\"Cloud Security\",\"Data Center\",\"Hybrid Cloud\",\"IT Strategy\",\"Private Cloud\",\"Public Cloud\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\",\"name\":\"Why multicloud security is your next big challenge 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg\",\"datePublished\":\"2020-01-16T15:50:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud computing\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cloud-computing\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why multicloud security is your next big challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why multicloud security is your next big challenge 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/","og_locale":"en_US","og_type":"article","og_title":"Why multicloud security is your next big challenge 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-16T15:50:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why multicloud security is your next big challenge","datePublished":"2020-01-16T15:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/"},"wordCount":1287,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg","keywords":["cloud computing","Cloud Security","Data Center","Hybrid Cloud","IT Strategy","Private Cloud","Public Cloud","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/","url":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/","name":"Why multicloud security is your next big challenge 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg","datePublished":"2020-01-16T15:50:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/why-multicloud-security-is-your-next-big-challenge.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-multicloud-security-is-your-next-big-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud computing","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"Why multicloud security is your next big challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32806"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32806\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32807"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}