New Study Reveals AI and Cloud Security as Major Business Concerns

Published:

spot_img

AI and Cloud Security: Key Business Concerns Unveiled in Recent Study

The Growing Importance of Cloud Security

With the ongoing rise in cloud-based solutions, security remains a top priority for businesses worldwide. As organizations increasingly rely on cloud infrastructure, ensuring the protection of sensitive information is of utmost importance. A recent study conducted by Thales, titled the 2025 Cloud Security Study, reveals that while cloud security dominates the list of concerns among IT leaders, a significant shift is occurring. More than half of the survey respondents—52% to be exact—are now prioritizing the security of their AI investments above all other security concerns.

Rethinking Risk Management Strategies

Sebastien Cano, Senior Vice President of Cybersecurity Products at Thales, highlights the urgency of this issue. He states, “The accelerating shift to cloud and AI is forcing enterprises to rethink how they manage risk at scale.” With over half of cloud data now classified as sensitive, organizations are prompted to modify their security strategies. Presently, only a fraction of that sensitive data is fully encrypted, suggesting that many businesses have not adapted their security measures to correspond with rapid cloud adoption.

Survey Insights on Business Priorities

Thales’ findings indicate that 64% of respondents have placed cloud security within their top five concerns. Remarkably, 17% of those surveyed consider it their number one priority. As enterprises increasingly opt for multi-cloud environments—reportedly adopting two cloud providers on average—maintaining robust security in the cloud setting remains a formidable challenge.

The Complexity of Securing SaaS Applications

The utilization of Software-as-a-Service (SaaS) applications continues to rise, with enterprises typically employing around 85 different SaaS applications. This surge poses additional challenges for ongoing security efforts. As security complexities multiply, 61% of businesses are utilizing five or more tools specifically for data discovery, coupled with 57% deploying at least five encryption key managers.

The Rising Threat Landscape

It’s no surprise that cloud environments are becoming prime targets for cyberattacks, given how dependent most organizations have become on cloud infrastructure. Alarmingly, four out of five of the most frequently targeted assets are hosted in the cloud. The survey revealed that 68% of respondents reported an uptick in access-based attacks leveraging stolen credentials. While 85% of organizations identify at least 40% of their cloud-stored data as sensitive, only 66% have enacted measures such as implementing multifactor authentication.

Human Error: A Persistent Challenge

Despite the advancements in technology, human error remains a significant contributor to security breaches in cloud environments. Eric Hanselman, Chief Analyst at S&P Global Market Intelligence 451 Research, notes the increasing complexity of securing cloud assets. The challenges are exacerbated by the requirements of AI initiatives that typically demand access to large quantities of sensitive data.

“Compounding this issue, four of the top five targeted assets in reported attacks are cloud-based,” Hanselman emphasizes. Strengthening cloud security while streamlining operations is vital for organizations aiming to enhance their overall security effectiveness and resilience.

Final Thoughts

As companies navigate the complex landscape of cloud and AI, prioritizing robust security measures becomes paramount. With the majority of businesses feeling the pressure of a rapidly evolving digital environment, the need for adaptable and proactive security strategies has never been more critical. The insights from Thales’ study provide valuable guidance for organizations seeking to fortify their defenses against emerging threats in the cloud.

For the complete findings and further insights, you may want to explore the full report.

spot_img

Related articles

Recent articles

Malicious Pull Request Affects Over 6,000 Developers Through Vulnerable Ethcode VS Code Extension

Rising Risks in Cybersecurity: Supply Chain Attack on Ethcode Extension Cybersecurity experts have recently raised alarms about a significant supply chain attack targeting a Microsoft...

Billions of Outdated Leaked Credentials and ULP Files Discovered on Dark Web

The Dark Web’s Data Dilemma: Understanding Combolists and ULP Files Recent investigations by threat intelligence experts bring into focus a pressing issue: the prevalence of...

Hefring Marine Unveils All-in-One Fleet Management App

Navigating New Waters: Hefring Marine’s Innovative App Revolutionizes Fleet Management In an ever-evolving maritime landscape, the need for efficient fleet management has become paramount. Hefring...

Experts Warn About Serious New Vulnerability in Windows

Critical Windows Vulnerability Raises Alarms Among Experts A newly identified vulnerability in Windows is making waves in the cybersecurity community, prompting urgent calls for action...