{"id":101369,"date":"2024-11-01T16:01:49","date_gmt":"2024-11-01T16:01:49","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=101369"},"modified":"2024-11-01T16:01:49","modified_gmt":"2024-11-01T16:01:49","slug":"security-gaps-found-in-encrypted-cloud-storage-services","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/","title":{"rendered":"Security gaps found in encrypted cloud storage services"},"content":{"rendered":"\n<p>Researchers from ETH Zurich have uncovered <a target=\"_blank\" href=\"https:\/\/brokencloudstorage.info\/\" rel=\"noreferrer noopener\">significant security vulnerabilities<\/a> in several widely used end-to-end encrypted (E2EE) cloud storage services.<\/p>\n\n\n\n<p>The cryptographic flaws could allow attackers to bypass encryption, compromise file confidentiality, tamper with data, or even inject unauthorised files into users\u2019 storage.<\/p>\n\n\n\n<p>The study analysed five E2EE cloud storage providers\u2014Sync, pCloud, Seafile, Icedrive, and Tresorit\u2014which collectively serve an estimated 22 million users worldwide. Each of the services promises robust encryption to safeguard files from unauthorised access, even by the service provider.<\/p>\n\n\n\n<p>However, researchers Jonas Hofmann and Kien Tuong Truong discovered that four of the five have severe flaws that might weaken protections. Presented at the ACM Conference on Computer and Communications Security (CCS), their findings highlight potential gaps in the E2EE security promises made by providers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tresorit stands out but isn\u2019t flawless<\/h3>\n\n\n\n<p>Of the services tested, Tresorit demonstrated the fewest vulnerabilities, with only minor risks of metadata tampering and non-authentic keys during file sharing. Although less severe, these issues could still pose risks in certain scenarios. In contrast, the other four services exhibited more substantial security gaps, increasing the chances of data exposure or tampering.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key vulnerabilities and realistic threats to E2EE<\/h3>\n\n\n\n<p>To evaluate the strength of E2EE security, researchers tested ten different attack scenarios, assuming the attacker had already gained control over a cloud server with permissions to read, modify, or inject data. Though this level of access is unlikely, the study contends that E2EE should be effective even under such conditions. Some notable vulnerabilities are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unauthenticated Key Material: Both Sync and pCloud were found to have unauthenticated encryption keys, allowing attackers to insert their own keys, decrypt files, and access sensitive data.<\/li>\n\n\n\n<li>Public key substitution: Sync and Tresorit were vulnerable to unauthorised key replacement during file sharing, allowing attackers to intercept or change files.<\/li>\n\n\n\n<li>Protocol downgrade attack: The protocols used by Seafile allowed for a downgrade to weaker encryption standards, making it more vulnerable to brute-force attacks.<\/li>\n<\/ul>\n\n\n\n<p>Other risks were identified in Icedrive and Seafile, which used unauthenticated encryption modes, allowing attackers to modify and corrupt file contents. Additionally, vulnerabilities in the \u201cchunking\u201d process across multiple services could compromise file integrity by allowing attackers to reorder, remove, or alter file pieces.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Provider provides responses and next steps<\/h3>\n\n\n\n<p>In April 2024, the researchers shared their findings with Sync, pCloud, Seafile, and Icedrive, followed by Tresorit in September. Responses varied, with Sync and pCloud yet to respond, Seafile preparing to patch the protocol downgrade issue, and Icedrive declining to address the concerns. Tresorit acknowledged receipt but declined to speak more.<\/p>\n\n\n\n<p>According to a recent <em><a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions\/\" rel=\"noreferrer noopener\">BleepingComputer<\/a><\/em> report, Sync indicated that they are \u201cfast-tracking fixes\u201d and have already resolved some of the documented data leak issues with file-sharing links.<\/p>\n\n\n\n<p>ETH Zurich researchers believe these security flaws are common across many E2EE cloud storage platforms, underscoring the need for further investigation and a standardised protocol to ensure secure encryption in the industry.<\/p>\n\n\n\n<p><em>(Image by <a href=\"https:\/\/pixabay.com\/users\/akitada31-172067\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=6515064\">Roman<\/a>)<\/em><\/p>\n\n\n\n<p><strong>See also: <a target=\"_blank\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/why-companies-continue-to-struggle-with-cloud-visibility-and-code-vulnerabilities\/\" rel=\"noreferrer noopener\">Why companies continue to struggle with cloud visibility \u2013 and code vulnerabilities<\/a><\/strong><\/p>\n\n\n\n<p><strong><em>Want to learn more about cybersecurity and the cloud from industry leaders? Check out<a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\">&nbsp;Cyber Security &amp; Cloud Expo<\/a>&nbsp;taking place in Amsterdam, California, and London.&nbsp;Explore other upcoming enterprise technology events and webinars powered by TechForge&nbsp;<a href=\"https:\/\/techforge.pub\/events\/\">here<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services. The cryptographic flaws could allow attackers to bypass encryption, compromise file confidentiality, tamper with data, or even inject unauthorised files into users\u2019 storage. The study analysed five E2EE cloud storage providers\u2014Sync, pCloud, Seafile, Icedrive, and Tresorit\u2014which [&hellip;]<\/p>\n","protected":false},"author":59514,"featured_media":101370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,30,55,33,3],"tags":[182,131,185,167],"ppma_author":[1844],"class_list":["post-101369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","category-cloud-computing-infrastructure","category-cloud-computing-privacy","category-cloud-computing-research","category-cloud-computing-security","tag-cloud","tag-cloud-security","tag-cybersecurity","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security gaps found in encrypted cloud storage services<\/title>\n<meta name=\"description\" content=\"A new study highlights critical flaws in end-to-end encryption, calling for improved security standards in cloud storage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security gaps found in encrypted cloud storage services\" \/>\n<meta property=\"og:description\" content=\"A new study highlights critical flaws in end-to-end encryption, calling for improved security standards in cloud storage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T16:01:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"671\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Muhammad Zulhusni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"andraencore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\"},\"author\":{\"name\":\"andraencore\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/64af6911d345adee885387b4d4109f51\"},\"headline\":\"Security gaps found in encrypted cloud storage services\",\"datePublished\":\"2024-11-01T16:01:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\"},\"wordCount\":553,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg\",\"keywords\":[\"cloud\",\"Cloud Security\",\"cybersecurity\",\"Security\"],\"articleSection\":[\"Cloud Computing\",\"Infrastructure\",\"Privacy\",\"Research\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\",\"name\":\"Security gaps found in encrypted cloud storage services\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg\",\"datePublished\":\"2024-11-01T16:01:49+00:00\",\"description\":\"A new study highlights critical flaws in end-to-end encryption, calling for improved security standards in cloud storage.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg\",\"width\":1440,\"height\":671,\"caption\":\"Security gaps found in encrypted cloud storage services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security gaps found in encrypted cloud storage services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/64af6911d345adee885387b4d4109f51\",\"name\":\"andraencore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/bd59e9e5386c451a5c3a9a913618c3ee\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/98a1cf49518036dae0695b980706637c2ed79751d4ff4f44acfd1abb172804a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/98a1cf49518036dae0695b980706637c2ed79751d4ff4f44acfd1abb172804a2?s=96&d=mm&r=g\",\"caption\":\"andraencore\"},\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/andraencore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security gaps found in encrypted cloud storage services","description":"A new study highlights critical flaws in end-to-end encryption, calling for improved security standards in cloud storage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/","og_locale":"en_GB","og_type":"article","og_title":"Security gaps found in encrypted cloud storage services","og_description":"A new study highlights critical flaws in end-to-end encryption, calling for improved security standards in cloud storage.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2024-11-01T16:01:49+00:00","og_image":[{"width":1440,"height":671,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg","type":"image\/jpeg"}],"author":"Muhammad Zulhusni","twitter_card":"summary_large_image","twitter_creator":"@cloud_comp_news","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"andraencore","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/"},"author":{"name":"andraencore","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/64af6911d345adee885387b4d4109f51"},"headline":"Security gaps found in encrypted cloud storage services","datePublished":"2024-11-01T16:01:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/"},"wordCount":553,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg","keywords":["cloud","Cloud Security","cybersecurity","Security"],"articleSection":["Cloud Computing","Infrastructure","Privacy","Research","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/","name":"Security gaps found in encrypted cloud storage services","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg","datePublished":"2024-11-01T16:01:49+00:00","description":"A new study highlights critical flaws in end-to-end encryption, calling for improved security standards in cloud storage.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/10\/Security-gaps-found-in-encrypted-cloud-storage-services-e1730416366207.jpg","width":1440,"height":671,"caption":"Security gaps found in encrypted cloud storage services"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/security-gaps-found-in-encrypted-cloud-storage-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Security gaps found in encrypted cloud storage services"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/64af6911d345adee885387b4d4109f51","name":"andraencore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/bd59e9e5386c451a5c3a9a913618c3ee","url":"https:\/\/secure.gravatar.com\/avatar\/98a1cf49518036dae0695b980706637c2ed79751d4ff4f44acfd1abb172804a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98a1cf49518036dae0695b980706637c2ed79751d4ff4f44acfd1abb172804a2?s=96&d=mm&r=g","caption":"andraencore"},"url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/andraencore\/"}]}},"authors":[{"term_id":1844,"user_id":60511,"is_guest":0,"slug":"muhammadzulhusni","display_name":"Muhammad Zulhusni","avatar_url":{"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg","url2x":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg"},"author_category":"","user_url":"","last_name":"Zulhusni","first_name":"Muhammad","job_title":"Journalist","description":"As a tech journalist, Zul focuses on topics including cloud computing, cybersecurity, and disruptive technology in the enterprise industry. He has expertise in moderating webinars and presenting content on video, in addition to having a background in networking technology."}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/101369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/59514"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=101369"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/101369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/101370"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=101369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=101369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=101369"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=101369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}