Attackers can abuse Google Cloud Build to poison production environments
Mitigate Cloud Breaches With a Holistic Approach to Cloud Identity and Access
Can Cloud Services Encourage Better Login Security? Netflix’s Accidental Model
hypervisor security
SOC 3 (System and Organization Controls 3)