Go With the (data) Flow: Three Ways to Find Hidden Security Risks in the Cloud Era