• About
  • Subscribe
  • Contact
Thursday, September 18, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Complexity remains the enemy of cloud security

FutureCISO Editors by FutureCISO Editors
September 3, 2025
Complexity remains the enemy of cloud security

Photo by Francesco Ungaro: https://www.pexels.com/photo/mosaic-alien-on-wall-1670977/

Share on FacebookShare on Twitter

As organisations increasingly migrate to the cloud, the complexity of cloud environments poses significant challenges for cybersecurity. The 2025 Thales Cloud Security Survey found that while 65% of leaders believe the energy transition is progressing at a sufficient pace, the intricacies of cloud security are becoming a pressing concern.

Most pressing security disciplines
Source: Thales 2025 Cloud Security Study

The study identified that nearly two-thirds of respondents ranked cloud security among their top five security challenges, with 17% considering it their most critical issue.

The complexity arises from several factors. Enterprises now average 2.1 Infrastructure-as-a-Service (IaaS) providers and employ around 85 Software-as-a-Service (SaaS) applications.

Furthermore, 61% of organisations utilise five or more tools for data discovery, and 57% deploy multiple enterprise key management systems. Alarmingly, one in three enterprises use over 500 APIs, creating a sprawling web of interconnected services that increases vulnerability.

Primary reasons why this complexity hampers security efforts:

  1. Multiple IT venues: With organisations leveraging multiple cloud providers alongside on-premises systems, security teams struggle to translate controls across platforms. Approximately 55% of respondents indicated that cloud security is more complex than on-premises security.
  2. SaaS application proliferation: The average number of SaaS applications per enterprise complicates the alignment of security products with existing policies, particularly concerning data and identity security.
  3. Tool sprawl: The extensive use of multiple tools for monitoring and classification can create “islands of management” that heighten the risk of misconfiguration and operational errors. error remains a critical vulnerability as well.

The report highlights that credential theft and stolen secrets attacks are the fastest-growing threats to cloud infrastructure, affecting 68% of organisations. As enterprises host more sensitive data in the cloud—80% report that at least 40% of their cloud data is classified as sensitive—this risk becomes even more pronounced.

Related:  Manage risk with better visibility and control

Despite these challenges, organisations are taking steps to mitigate risks. A rising number are encrypting sensitive data and implementing “bring-your-own-key” (BYOK) strategies. Additionally, 65% use multi-factor authentication to secure cloud access, although adoption of privileged access management remains relatively low at 38%.

The rapid integration of AI into cloud services is further complicating security. As businesses rush to deploy AI applications, 52% of respondents indicated that AI security spending is straining overall security budgets. This highlights the need for organisations to reassess their resource allocation to maintain robust security postures.

In conclusion, while cloud environments offer significant advantages, they also present new challenges that require strategic responses. Embracing encryption, simplifying security management through integrated tools, and fostering a unified security environment can help organisations navigate this complexity.

With the right approach, enterprises can unlock new opportunities and harness the potential of emerging technologies, ensuring a secure foundation for future innovation.

Tags: cloud securityThales
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Strategies for embedding resilience by design for Asian banks
  • New regulations shape cloud security investments in Asia
  • PodChats for FutureCISO: Restoring trust in a world of deception
  • Guarding Asia's agentic AI transformation
  • Shortened certificate lifecycles accelerate PKI market evolution

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl