Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Simplifying complexity for a secure hybrid multicloud environment

By Mignona Cote
internal computer pieces

Image via Unsplash

June 2, 2023

Today, most enterprises are using more than one cloud provider. As cloud adoption accelerates and businesses innovate faster to compete, security leaders must efficiently — and securely — move workloads across more clouds, creating more complexity in their IT environments. In fact, more than 98% of security leaders reported their business is impacted by issues of increasing complexity with 45% noting increased security risk as they navigate both internal demands and external threats from bad actors. But, when it comes to cybersecurity, the biggest threats are often quite simple and much closer to home.

From cost containment issues, to plummeting budgets and skepticism from leadership on the value of cloud initiatives, security leaders are scrambling to address a barrage of competing priorities to satisfy stakeholders as they also look for growth and innovation opportunities. Managing cybersecurity threats can seem overwhelming under the best of circumstances, and today’s threat landscape has never been more complex. Some of the biggest threats to corporate security reside in email and SMS texts in the way of phishing scams and links that propagate destructive viruses when clicked. Even as cyberattacks grow in sophistication, it’s Cybersecurity 101 where security leaders most often slip up and let in bad actors — or fail to recognize insider threats. Security leaders need to get back to basics with company employees and it starts with making security simpler, while leveraging advanced technologies such as artificial intelligence.

Streamlining data protection

Not only are expert technology executives navigating the complexity of a hybrid, multicloud environment, but so are less technical employees across any given organization, leaving room for human error on each workstation and at every virtual interaction. While most companies conduct training on basic cybersecurity threats like phishing and vulnerability scanning (e.g., don’t click the link), accidents happen and employees can still slip up by making minute changes, leaving their company’s sensitive data and entire infrastructure at risk.

Indeed, as companies navigate the complexity of multicloud environments, it’s easy to understand why it can be an uphill climb for employees to turn training into action when it comes to cybersecurity. While security experts will always need to be part of the equation to ensure a secure multicloud environment, security is automated to a large degree, with highly configurable settings that can detect threats — and even anticipate them. But this can lead to false confidence and complacency, which is especially true if we think about the fact that new vulnerabilities often capitalize on existing vulnerabilities that may have been detected but not fully eliminated. Prevention is always better than a cure as cures can be incomplete. AI is increasingly valuable for preventing cyber-attacks before they’re allowed to propagate. 

Embracing new AI tools to automate cyber protections 

For any company, managing cybersecurity risk can seem overwhelming under the best of circumstances; however, today’s threat landscape has never been greater, and attackers are increasingly dangerous for sophisticated and agile with lasting, devastating consequences. 

Companies today need to automate their hybrid, multicloud monitoring and threat response to embed an extra level of protection that triages red flags before they escalate and cause irreparable damage. Today’s AI-supported cloud tools can automatically stress test a company’s cybersecurity posture, maintain regular risk assessments, and manage new threats. These automated solutions can remove bottlenecks to enable more efficient data collection, accelerate AI workloads and deliver smoother cloud integration. Ultimately, companies with a high level of AI-driven security protocols can future-proof their cloud networks so they can scale efficiently, without downtime while data is moved between clouds and between data centers and the cloud freely and safely – without downtime and without lost productivity. 

Simplifying with an evolved cloud approach

While AI has done much of the heavy lifting to keep data secure, security teams still need to mind the store. But they need tools to help them do this. In an evolved cloud state, cloud is fully integrated into your architecture and operations, rather than another walled garden. Applications can pull data effortlessly from multiple clouds, data can move freely, securely and consistently between clouds to keep business logic moving forward, and businesses can quickly adapt to deliver on outcomes in a dynamic macro environment. This delivers observability everywhere so businesses can maximize the benefits of their multicloud architecture more purposefully and strategically, while simplifying cybersecurity.

As cloud advancements abound complexity increases, and many companies managing critical data remain unprepared. Gone are the days of the reactionary “act now, think later” approach to cloud integrations and threats to security. Rather, business leaders looking to capitalize on multicloud environments must take the time to consider how to overcome cloud complexity and look ahead to what’s yet to come. From simple changes to advanced AI, companies can remove blind spots and security vulnerabilities that mitigate risk and free up time for innovation and growth initiatives. As the multicloud evolves, the question remains: Who will choose to evolve with it?   

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) cloud security employee training hybrid security systems threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mignona Cote is the Chief Information Security Officer at NetApp. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Security guard

Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • touch screen

    Access control in a hybrid-cloud environment

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More
  • remote work

    What you cannot see you cannot secure: Shining a light on cybersecurity threats in a work-from-home environment

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing