APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Cross-tenant cloud attacks: Still a myth?

    The flexibility of work practices and scalability enables cloud infrastructures to regulate fluctuating workloads accordingly.  

    Cross-tenant cloud attacks: Still a myth?

    By

    Apac CIOOutlook | Thursday, January 01, 1970

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    The flexibility of work practices and scalability enables cloud infrastructures to regulate fluctuating workloads accordingly. Large enterprises turn to the cloud for a cost-effective method of running resource-intensive applications while maintaining a balance between both private and public clouds for their workloads. Small-to-medium businesses and start-ups mostly prefer public clouds for ease of feasibility, its cost-effectiveness, and security purposes.

    Service providers have a clear demarcation between the data of one customer and another. It doesn’t matter if the customer has rented the cloud services temporarily or on a regular basis, the data is safe. Virtual private cloud, encryption and API keys provide the much-needed data security. Encryption also protects against hacking that comes from outside the cloud. Most enterprises encrypt their data on public clouds, both in-flight and at rest. Even if a tenant could access server instances held in other tenants’ account, reading the data will still be restricted.

    Public cloud providers implement security systems that can restrict any cross-tenant attack. The tenant-management systems handle resources for many tenants at the same time, which indeed is a legitimate concern for enterprises leaving room for a healthy level of skepticism about security in cloud services. But there are sufficient virtual demarcations between the numerous tenants, which ensure the security of multi-tenant systems. Multi-tenancy is the core necessity of cloud computing. After incorporating the required degree of multi-tenancy into all the layers of public and private clouds, only then can an enterprise achieve improved scalability, agility, and economies of scale.

    If an individual takes basic security precautions in the cloud along with the adaptive mitigation mechanism of the service providers, there is no need to stress over the possibility of cross-tenant cloud attack.

    More in News

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Impact of Blockchain on Supply Chain Innovation

    Impact of Blockchain on Supply Chain Innovation

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/crosstenant-cloud-attacks-still-a-myth-nwid-4901.html