paint-brush
Analyzing The NotPetya Malware, Cloud Computing, And Cybersecurity Risksby@sarahaustin
363 reads
363 reads

Analyzing The NotPetya Malware, Cloud Computing, And Cybersecurity Risks

by Sarah Austin5mAugust 7th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In June 2017, a variant of the Petya malware worm, NotPetya, wreaked global havoc. Global enterprise networks from Ukraine to the shores of New Jersey’s commercial shipping depots were eviscerated. The fallout was an estimated $10 billion in damages. Cloud computing needs to revamp its core infrastructure. It needs to be protective against large-scale cyber warfare forces and bring cloud computing to the level that an IoT revolution requires. The costs of outdated systems and ones susceptible to outages and hacks continue racking up.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Analyzing The NotPetya Malware, Cloud Computing, And Cybersecurity Risks
Sarah Austin HackerNoon profile picture
Sarah Austin

Sarah Austin

@sarahaustin

Author & TV host formerly: @Forbes @MTV @BravoTV & Marketing Manager: @Oracle @SAP @HP

Learn More
LEARN MORE ABOUT @SARAHAUSTIN'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Sarah Austin HackerNoon profile picture
Sarah Austin@sarahaustin
Author & TV host formerly: @Forbes @MTV @BravoTV & Marketing Manager: @Oracle @SAP @HP

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Startupnchill
Papasearch