{"id":41334,"date":"2021-06-14T10:00:00","date_gmt":"2021-06-14T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/"},"modified":"2021-06-14T10:00:00","modified_gmt":"2021-06-14T10:00:00","slug":"the-great-cloud-computing-surge","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/","title":{"rendered":"The great cloud computing surge"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2021\/06\/spot_cloud_3x2_01_ifw_overview_clouds_in_blue_sky_and_reflected_in_windows_of_modern_skyscraper_by_sergey_parantaev_shutterstock_107483930_royalty-free_digital-only_a-100891914-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>We reached a big milestone in 2020: Cloud services revenue finally surpassed enterprise spending on data centers, <a href=\"https:\/\/www.infoworld.com\/article\/3612769\/cloud-spending-outstrips-on-premises-investments-for-the-first-time.html\">according to the Synergy Research Group<\/a>. One of the longest-running trends in IT \u2013 moving to the cloud \u2013 has been turbocharged, driven in part by a pandemic that pushed enterprises to avoid the logistical challenges and capital expense of deploying on prem.<\/p>\n<p>But the endless capacity to add horsepower without provisioning your own infrastructure isn\u2019t the biggest draw. Amazon Web Services, Microsoft Azure, and Google Cloud have become launchpads for the latest technology innovations, which developers can jump on to build innovative new applications. <a href=\"https:\/\/www.infoworld.com\/article\/3163525\/the-best-machine-learning-and-deep-learning-libraries.html\">Machine learning libraries<\/a>? Globally <a href=\"https:\/\/www.infoworld.com\/article\/3406458\/the-best-distributed-relational-databases.html\">distributed databases<\/a>? <a href=\"https:\/\/www.infoworld.com\/article\/3539010\/how-to-choose-a-cloud-iot-platform.html\">IoT platforms<\/a> with all the bells and whistles? The big three clouds have \u2018em all \u2013 ready, waiting, and API-accessible. It\u2019s enough to make you wonder why you\u2019d bother to build and maintain your own datacenter.<\/p>\n<p>That\u2019s exactly what Brunswick, a recreational boating company, wondered. In &#8220;<a href=\"https:\/\/www.cio.com\/article\/3621514\/cloud-or-bust-it-leaders-go-all-in-on-cloud-computing.html\">Cloud or bust: IT leaders go all in on cloud computing<\/a>,&#8221; CIO contributor Mary Pratt reveals that it took Brunswick a decade to get there, but the company\u2019s IT estate is now 90% in the cloud, using a combination of <a href=\"https:\/\/www.infoworld.com\/article\/3220669\/what-is-iaas-your-data-center-in-the-cloud.html\">IaaS<\/a>, <a href=\"https:\/\/www.infoworld.com\/article\/3226386\/what-is-saas-software-as-a-service-defined.html\">SaaS<\/a>, and <a href=\"https:\/\/www.infoworld.com\/article\/3223434\/what-is-paas-software-development-in-the-cloud.html\">PaaS<\/a> offerings that has enabled the decommissioning of two data centers. According to Pratt, Bain &amp; Company, DeVry University, and the University of California, San Diego, are all at similarly advanced phases in their cloud journeys. As UC San Diego CIO Vince Kellen says, \u201ccloud is a necessary and eventual transition that just about every organization is going to make.\u201d<\/p>\n<aside class=\"sidebar medium\">\n<h3 class=\"body\">Tech Spotlight: <br \/><a href=\"https:\/\/www.infoworld.com\/article\/3621752\/the-great-cloud-computing-surge.html\">Cloud Computing<\/a><\/h3>\n<\/aside>\n<p>Clearly, the pace of that transition kicked into high gear during the pandemic. In &#8220;<a href=\"https:\/\/www.infoworld.com\/article\/3620939\/from-legacy-to-the-cloud-the-3-stages-of-enterprise-modernization.html\">From legacy to the cloud: The 3 stages of enterprise modernization<\/a>,&#8221;&nbsp;UK Group Editor Scott Carey cites Red Hat CEO Paul Cormier&#8217;s estimate that, for his customers, the pandemic has accelerated cloud adoption by five years. Last year&#8217;s great migration to working from home drove a new spike in SaaS adoption, with videoconferencing and other cloud applications enabling remote work. The second and third phases involve embracing <a href=\"https:\/\/www.infoworld.com\/article\/3281046\/what-is-cloud-native-the-modern-way-to-develop-software.html\">the cloud native model<\/a> and migrating legacy apps to the cloud.<\/p>\n<p>Shifting to the cloud at scale is never easy. Cloud migration means applications must be refactored, cloud costs need to be monitored and optimized, and obtaining cloud expertise requires internal training and\/or hiring expensive talent. For companies that use multiple clouds, security is a particularly knotty area, because each of the big three clouds has a different security feature set, <a href=\"https:\/\/www.csoonline.com\/article\/3620965\/aws-access-control-confusion-enables-cross-account-attacks.html\">increasing the risk of configuration errors<\/a>. CSO contributor Neal Weinberg digs into the details in &#8220;<a href=\"https:\/\/www.csoonline.com\/article\/3621608\/aws-google-cloud-platform-and-azure-how-their-security-features-compare.html\">AWS, Google Cloud Platform and Azure: How their security features compare<\/a>.&#8221;<\/p>\n<p>Even something seemingly as simple as moving from an on-prem Exchange Server to one hosted by Microsoft has its challenges. Contributor Jonathan Hassell offers a step-by-step guide born of experience in &#8220;<a href=\"https:\/\/www.computerworld.com\/article\/3618592\/migrating-to-hosted-exchange-do-s-and-don-ts.html\">Migrating to hosted Exchange: Do\u2019s and don\u2019ts<\/a>.&#8221; It&#8217;s a must-read for anyone facing this laborious task.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Cloud computing&#8217;s real potential, though, is in the shiny new stuff. In a second article, this one for Network World, Neal Weinberg looks at the IoT platforms offered by various clouds vs. solutions you can assemble on-prem in &#8220;<a href=\"http:\/\/preview-app1.usw.www.idgesg.networkworld.com\/article\/3620292\/iot-cloud-services-how-they-stack-up-against-diy.html\">IoT cloud services: How they stack up against DIY<\/a>.&#8221; A big plus for cloud right off the bat: IoT often demands the ingestion of huge quantities of data, which the cloud can accommodate dynamically.&nbsp;AWS, IBM, and Microsoft in particular have IoT cloud offerings with feature sets that would be difficult to assemble piece by piece on prem.<\/p>\n<p>Rich arrays of pre-provisioned services like these highlight the potential of the cloud to offer platforms for building the future. No, <a href=\"https:\/\/www.networkworld.com\/article\/3621235\/why-the-cloud-will-never-eat-the-data-center.html\">the cloud will never completely replace the data center<\/a>. But after this past year, the updraft is stronger than ever, as limitless scalability and endless assortments of new services make the cloud increasingly irresistible.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p> READ MORE <a href=\"https:\/\/www.infoworld.com\/article\/3621752\/the-great-cloud-computing-surge.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Driven in part by the pandemic, cloud computing adoption has reached new heights. These five articles take a close look at the implications. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41335,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[598,1253,9410,536,4558,601],"class_list":["post-41334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-amazon-web-services","tag-cloud-computing","tag-cloud-management","tag-cloud-security","tag-google-cloud-platform","tag-microsoft-azure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The great cloud computing surge 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The great cloud computing surge 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-14T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/the-great-cloud-computing-surge.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The great cloud computing surge\",\"datePublished\":\"2021-06-14T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/the-great-cloud-computing-surge.jpg\",\"keywords\":[\"Amazon Web Services\",\"cloud computing\",\"Cloud Management\",\"Cloud Security\",\"Google Cloud Platform\",\"Microsoft Azure\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/\",\"name\":\"The great cloud computing surge 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/the-great-cloud-computing-surge.jpg\",\"datePublished\":\"2021-06-14T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/the-great-cloud-computing-surge.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/the-great-cloud-computing-surge.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-great-cloud-computing-surge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amazon Web Services\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/amazon-web-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The great cloud computing surge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The great cloud computing surge 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/","og_locale":"en_US","og_type":"article","og_title":"The great cloud computing surge 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-14T10:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/the-great-cloud-computing-surge.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The great cloud computing surge","datePublished":"2021-06-14T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/the-great-cloud-computing-surge.jpg","keywords":["Amazon Web Services","cloud computing","Cloud Management","Cloud Security","Google Cloud Platform","Microsoft Azure"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/","url":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/","name":"The great cloud computing surge 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/the-great-cloud-computing-surge.jpg","datePublished":"2021-06-14T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/the-great-cloud-computing-surge.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/the-great-cloud-computing-surge.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-great-cloud-computing-surge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Amazon Web Services","item":"https:\/\/www.threatshub.org\/blog\/tag\/amazon-web-services\/"},{"@type":"ListItem","position":3,"name":"The great cloud computing surge"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41334"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41335"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}