• About
  • Subscribe
  • Contact
Wednesday, December 24, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Endpoint Security

API and identity exploits are the weakest links in Asia's cloud security

FutureCISO Editors by FutureCISO Editors
December 24, 2025
API and identity exploits are the weakest links in Asia's cloud security

Photo by Pixabay: https://www.pexels.com/photo/brown-wooden-mallet-near-brown-chicken-egg-40721/

Share on FacebookShare on Twitter

CISOs in Asia face a rapidly evolving cloud security landscape, with the accelerated adoption of enterprise AI bringing unprecedented risks.

Palo Alto Networks' "State of Cloud Security Report 2025" reveals a stark reality: 99% of organisations have experienced an attack on their AI systems in the past year.

Source: Palo Alto Networks 2025

This surge is fuelled by the increasing use of AI-assisted coding, which, while boosting productivity, introduces insecure code at a pace security teams can't match.

Attackers are exploiting foundational cloud layers, targeting API infrastructure and identity management. API attacks have jumped by 41%, and lenient identity and access management (IAM) practices remain a top challenge, with 53% of respondents citing them as a leading vector for data exfiltration.

This is particularly concerning as agentic AI relies heavily on APIs, expanding the attack surface.

The report highlights the growing imperative for cloud and Security Operations Centre (SOC) unification. Tool sprawl, with an average of 17 cloud security tools from five vendors, creates blind spots and slows incident response.

Elad Koren

"As organisations aggressively scale cloud investments to power AI initiatives, they are inadvertently opening the door to sophisticated new attack vectors... Teams need more than just dashboards highlighting risks they can never burn down; they must transform with an agentic-first platform that spans code to cloud to SOC to finally operate faster than the adversary," said Elad Koren, vice president of product management, Cortex at Palo Alto Networks.

For Asian CISOs, key steps include consolidating security tools, enforcing stricter IAM practices, and integrating cloud security with SOC workflows. The report emphasises the need for an end-to-end solution that merges proactive risk reduction with reactive incident response.

Related:  Manufacturers only to blame for poor cyber threat preparedness

By embracing an agentic-first platform, organisations can operate at machine speed, staying ahead of AI-powered threats. Failing to adapt leaves cloud environments exposed, with attackers compromising environments in minutes while defenders take weeks to remediate.

Tags: API exploitscloud securityidentity exploitsPalo Alto Networksweakest links
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • API and identity exploits are the weakest links in Asia's cloud security
  • CrowdStrike extends Falcon to protect AI interactions
  • ESET: LongNosedGoblin deploys cyberespionage tools in Southeast Asia and Japan
  • Rewiring banks’ cyber defence from reactive to preemptive in 2026
  • PodChats for FutureCISO: What needs to happen for AI to deliver on its promises in 2026

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl