2022 IBM's Security X-Force cloud threat landscape report
Recommendations for preparing and responding to cloud breaches


As organisations continue to migrate to, or manage their, private, public, hybrid cloud or multi-cloud environments, security should be an integral part of the process. Unfortunately, embedding security in every step of your organisations' cloud journey can be challenging.
The 3rd annual report by IBM Security X-Force helps organisations learn how they can prepare and react to security incidents involving their cloud environments more effectively.
Download this report now to learn more.
Provided by
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Using DeepSeek at work is like ‘printing out and handing over your confidential information’
News Thinking of using DeepSeek at work? Think again. Cybersecurity experts have warned you're putting your enterprise at huge risk.
-
Can cyber group takedowns last?
ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
IBM and SAP expand partnership to drive generative AI capabilities
News The new Value Generation initiative aims to deliver greater client productivity gains through generative AI solutions
-
Driving business innovation through application modernization and hybrid cloud
webinar Transform with IBM Z
-
Building an intelligent, modern, sustainable enterprise
Whitepaper Accelerate your SAP transformation with IBM and AWS
-
Tangible business value from cloud transformation remains elusive
Whitepaper Discover the top five secrets to mastering cloud for business
-
Cloud-enabled manufacturing
Whitepaper Operations and IT leaders turn ambition into advantage
-
DCIG: Top five enterprise Storage as A Service solutions
Whitepaper Operations and IT leaders turn ambition into advantage
-
Amplify business transformation with business intelligence
Whitepaper Four key benefits of moving your operations to the cloud
-
Cloud security breaches surge on a wave of stolen credentials
News Cloud security attacks are growing in both scale and intensity, according to new research from CrowdStrike, with threat actors leveraging stolen credentials to devastating effect