{"id":105261,"date":"2025-04-21T03:00:37","date_gmt":"2025-04-21T02:00:37","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=105261"},"modified":"2025-04-22T07:35:39","modified_gmt":"2025-04-22T06:35:39","slug":"cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/","title":{"rendered":"CISA issues guidance amid unconfirmed Oracle Cloud breach"},"content":{"rendered":"\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) is urging organisations and individuals to take precautions amid concerns about a potential compromise involving a legacy Oracle cloud environment.<\/p>\n\n\n\n<p>In an alert issued Wednesday, CISA acknowledged ongoing reports of suspicious activity targeting Oracle customers. While the full scope of the threat remains unclear, the agency flagged several risks, particularly around exposed or reused credentials.<\/p>\n\n\n\n<p>CISA\u2019s guidance highlights the danger of credential material\u2014such as usernames, passwords, authentication tokens, and encryption keys\u2014being embedded in scripts, automation tools, or infrastructure templates. If compromised, credentials can grant long-term access to attackers and are often difficult to detect.<\/p>\n\n\n\n<p>The agency is advising organisations to take several steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reset passwords for users who may have been affected, especially where credentials aren\u2019t managed through centralised identity systems.<\/li>\n\n\n\n<li>Review and update any scripts, code, or configuration files that may contain hardcoded credentials, replacing them with secure authentication methods.<\/li>\n\n\n\n<li>Monitor authentication logs for any unusual activity, with extra attention on accounts with administrative or elevated privileges.<\/li>\n\n\n\n<li>Enforce phishing-resistant multifactor authentication for both user and admin accounts wherever possible.<\/li>\n<\/ul>\n\n\n\n<p>The advisory follows claims made in recent weeks about a large-scale breach involving up to six million records and as many as 140,000 Oracle tenants. Researchers at CloudSek pointed to a vulnerability in Oracle Cloud\u2019s login system, while TrustWave SpiderLabs said its analysis of a dataset supports the breach claims.<\/p>\n\n\n\n<p>Oracle has publicly denied any compromise of Oracle Cloud Infrastructure (OCI) and maintains customer data has not been affected. Despite the denials, the company hasn\u2019t issued formal guidance or a public advisory to customers. Security professionals say Oracle has communicated with some customers privately but has stayed largely silent in the public domain.<\/p>\n\n\n\n<p>An Oracle spokesperson stated, \u201cThere has been no breach of Oracle Cloud (OCI),\u201d to Cybersecurity Dive earlier this month. It said the circulated credentials are unrelated to OCI.<\/p>\n\n\n\n<p>Two lawsuits have already been filed\u2014one against Oracle Health in Missouri, and the other against Oracle Corporation in Texas.<\/p>\n\n\n\n<p>Industry groups are calling for more openness from Oracle. Errol Weiss, chief security officer at the Health-Information Sharing and Analysis Center, said Oracle had yet to respond to an invitation to engage with the group\u2019s members. \u201cWe\u2019re disappointed with the lack of transparency from Oracle,\u201d he said.<\/p>\n\n\n\n<p>Jonathan Braley, director of threat intelligence at IT-ISAC, said the CISA advisory offers some direction while stakeholders continue to wait for more detailed information. \u201cThe advisory is helpful in that we have a credible report we can share, though it appears CISA has taken a proactive stance of mitigating \u201dpotential unauthorised access\u201d as we all await details from Oracle,\u201d he said.<\/p>\n\n\n\n<p>For now, security experts continue to monitor the situation, repeating calls to Oracle to provide further clarity to its customers and the broader cybersecurity community.<\/p>\n\n\n\n<p><em>(Photo by <a href=\"https:\/\/unsplash.com\/photos\/person-in-black-long-sleeve-shirt-using-macbook-pro-em5w9_xj3uU?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Unsplash<\/a>)<\/em><\/p>\n\n\n\n<p><strong>See also: <a target=\"_blank\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/oracle-cloud-denies-breach-as-hacker-offers-6-million-records-for-sale\/\" rel=\"noreferrer noopener\">Oracle Cloud denies breach as hacker offers 6 million records for sale<\/a><\/strong><\/p>\n\n\n\n<p><em>Want to learn more about cybersecurity and the cloud from industry leaders? Check out <a target=\"_blank\" href=\"https:\/\/www.cybersecuritycloudexpo.com\/\" rel=\"noreferrer noopener\">Cyber Security &amp; Cloud Expo<\/a> taking place in Amsterdam, California, and London.<\/em><\/p>\n\n\n\n<p><em>Explore other upcoming enterprise technology events and webinars powered by TechForge <a target=\"_blank\" href=\"https:\/\/techforge.pub\/events\/\" rel=\"noreferrer noopener\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Cybersecurity and Infrastructure Security Agency (CISA) is urging organisations and individuals to take precautions amid concerns about a potential compromise involving a legacy Oracle cloud environment. In an alert issued Wednesday, CISA acknowledged ongoing reports of suspicious activity targeting Oracle customers. While the full scope of the threat remains unclear, the agency flagged [&hellip;]<\/p>\n","protected":false},"author":60511,"featured_media":105262,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,3],"tags":[182,185,257,167],"ppma_author":[1844],"class_list":["post-105261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","category-cloud-computing-security","tag-cloud","tag-cybersecurity","tag-oracle","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CISA issues guidance amid unconfirmed Oracle Cloud breach<\/title>\n<meta name=\"description\" content=\"CISA is urging organisations to secure credentials and review systems for embedded access keys, following reports of an alleged Oracle Cloud breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA issues guidance amid unconfirmed Oracle Cloud breach\" \/>\n<meta property=\"og:description\" content=\"CISA is urging organisations to secure credentials and review systems for embedded access keys, following reports of an alleged Oracle Cloud breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-21T02:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-22T06:35:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Muhammad Zulhusni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Muhammad Zulhusni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\"},\"author\":{\"name\":\"Muhammad Zulhusni\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/60c27b0abb3d5ab97535fbec3cf4ddcd\"},\"headline\":\"CISA issues guidance amid unconfirmed Oracle Cloud breach\",\"datePublished\":\"2025-04-21T02:00:37+00:00\",\"dateModified\":\"2025-04-22T06:35:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\"},\"wordCount\":531,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg\",\"keywords\":[\"cloud\",\"cybersecurity\",\"ORacle\",\"Security\"],\"articleSection\":[\"Cloud Computing\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\",\"name\":\"CISA issues guidance amid unconfirmed Oracle Cloud breach\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg\",\"datePublished\":\"2025-04-21T02:00:37+00:00\",\"dateModified\":\"2025-04-22T06:35:39+00:00\",\"description\":\"CISA is urging organisations to secure credentials and review systems for embedded access keys, following reports of an alleged Oracle Cloud breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg\",\"width\":1440,\"height\":960,\"caption\":\"CISA issues guidance amid unconfirmed Oracle Cloud breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA issues guidance amid unconfirmed Oracle Cloud breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/60c27b0abb3d5ab97535fbec3cf4ddcd\",\"name\":\"Muhammad Zulhusni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/6e1a88c23ef6223ae8c711ad4b2fc28c\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg\",\"caption\":\"Muhammad Zulhusni\"},\"description\":\"As a tech journalist, Zul focuses on topics including cloud computing, cybersecurity, and disruptive technology in the enterprise industry. He has expertise in moderating webinars and presenting content on video, in addition to having a background in networking technology.\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/muhammadzulhusni\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISA issues guidance amid unconfirmed Oracle Cloud breach","description":"CISA is urging organisations to secure credentials and review systems for embedded access keys, following reports of an alleged Oracle Cloud breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/","og_locale":"en_GB","og_type":"article","og_title":"CISA issues guidance amid unconfirmed Oracle Cloud breach","og_description":"CISA is urging organisations to secure credentials and review systems for embedded access keys, following reports of an alleged Oracle Cloud breach.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2025-04-21T02:00:37+00:00","article_modified_time":"2025-04-22T06:35:39+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg","type":"image\/jpeg"}],"author":"Muhammad Zulhusni","twitter_card":"summary_large_image","twitter_creator":"@cloud_comp_news","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"Muhammad Zulhusni","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/"},"author":{"name":"Muhammad Zulhusni","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/60c27b0abb3d5ab97535fbec3cf4ddcd"},"headline":"CISA issues guidance amid unconfirmed Oracle Cloud breach","datePublished":"2025-04-21T02:00:37+00:00","dateModified":"2025-04-22T06:35:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/"},"wordCount":531,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg","keywords":["cloud","cybersecurity","ORacle","Security"],"articleSection":["Cloud Computing","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/","name":"CISA issues guidance amid unconfirmed Oracle Cloud breach","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg","datePublished":"2025-04-21T02:00:37+00:00","dateModified":"2025-04-22T06:35:39+00:00","description":"CISA is urging organisations to secure credentials and review systems for embedded access keys, following reports of an alleged Oracle Cloud breach.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/CISA-issues-guidance-amid-unconfirmed-Oracle-Cloud-breach-scaled-e1744951967554.jpg","width":1440,"height":960,"caption":"CISA issues guidance amid unconfirmed Oracle Cloud breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/cisa-issues-guidance-amid-unconfirmed-oracle-cloud-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"CISA issues guidance amid unconfirmed Oracle Cloud breach"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/60c27b0abb3d5ab97535fbec3cf4ddcd","name":"Muhammad Zulhusni","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/6e1a88c23ef6223ae8c711ad4b2fc28c","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg","caption":"Muhammad Zulhusni"},"description":"As a tech journalist, Zul focuses on topics including cloud computing, cybersecurity, and disruptive technology in the enterprise industry. He has expertise in moderating webinars and presenting content on video, in addition to having a background in networking technology.","url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/muhammadzulhusni\/"}]}},"authors":[{"term_id":1844,"user_id":60511,"is_guest":0,"slug":"muhammadzulhusni","display_name":"Muhammad Zulhusni","avatar_url":{"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg","url2x":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/05\/muhammadprof.jpeg"},"author_category":"","user_url":"","last_name":"Zulhusni","first_name":"Muhammad","job_title":"Journalist","description":"As a tech journalist, Zul focuses on topics including cloud computing, cybersecurity, and disruptive technology in the enterprise industry. He has expertise in moderating webinars and presenting content on video, in addition to having a background in networking technology."}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/105261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/60511"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=105261"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/105261\/revisions"}],"predecessor-version":[{"id":105283,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/105261\/revisions\/105283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/105262"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=105261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=105261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=105261"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=105261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}