{"id":166302,"date":"2023-06-24T02:25:03","date_gmt":"2023-06-24T07:25:03","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/06\/securing-devops-how-hackers-access-cloud-production-systems"},"modified":"2023-06-24T02:25:03","modified_gmt":"2023-06-24T07:25:03","slug":"securing-devops-how-hackers-access-cloud-production-systems","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/06\/securing-devops-how-hackers-access-cloud-production-systems","title":{"rendered":"Securing DevOps: How Hackers Access Cloud Production Systems"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/securing-devops-how-hackers-access-cloud-production-systems.jpg\"><\/a><\/p>\n<p>Attackers are increasingly targeting vulnerable developer laptops to infiltrate production systems without directly attacking them, warned cloud security expert Lee Atchison.<\/p>\n<p>Instead of waiting for an application to become fully functional, hackers target the development process used to bring an application to a state of operation, Atchison said, speaking at a recent Uptycs-sponsored <a href=\"https:\/\/www.uptycs.com\/cybersecurity-standup\" rel=\"noopener\" target=\"_blank\">Cybersecurity Standup<\/a>, \u201cCastles in the Sky \u2013 Secure Your App Dev Pipeline From Laptop to Cloud.\u201d<\/p>\n<p>\u201cWe focus so much attention on keeping data and cloud data centers secure. But we haven\u2019t realized that all of this technology feeds into the data centers and that one of the primary drivers of that is developers, the source code they develop, and the machines that they develop the source code on,\u201d Atchison said. \u201cThose DevOps machines feed into the production systems but have nowhere near the level of protection behind them that the production data centers do.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers are increasingly targeting vulnerable developer laptops to infiltrate production systems without directly attacking them, warned cloud security expert Lee Atchison. Instead of waiting for an application to become fully functional, hackers target the development process used to bring an application to a state of operation, Atchison said, speaking at a recent Uptycs-sponsored Cybersecurity Standup, [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-166302","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/166302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=166302"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/166302\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=166302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=166302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=166302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}