As companies rush to adopt service oriented architecture, clouds and other distributed models of computing, determined insiders and outsiders are poised to seek out and exploit vulnerabilities of these technologies. Here's what you should look out for in 2009