Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Simplifying complexity for a secure hybrid multicloud environment

By Mignona Cote
internal computer pieces

Image via Unsplash

June 2, 2023

Today, most enterprises are using more than one cloud provider. As cloud adoption accelerates and businesses innovate faster to compete, security leaders must efficiently — and securely — move workloads across more clouds, creating more complexity in their IT environments. In fact, more than 98% of security leaders reported their business is impacted by issues of increasing complexity with 45% noting increased security risk as they navigate both internal demands and external threats from bad actors. But, when it comes to cybersecurity, the biggest threats are often quite simple and much closer to home.

From cost containment issues, to plummeting budgets and skepticism from leadership on the value of cloud initiatives, security leaders are scrambling to address a barrage of competing priorities to satisfy stakeholders as they also look for growth and innovation opportunities. Managing cybersecurity threats can seem overwhelming under the best of circumstances, and today’s threat landscape has never been more complex. Some of the biggest threats to corporate security reside in email and SMS texts in the way of phishing scams and links that propagate destructive viruses when clicked. Even as cyberattacks grow in sophistication, it’s Cybersecurity 101 where security leaders most often slip up and let in bad actors — or fail to recognize insider threats. Security leaders need to get back to basics with company employees and it starts with making security simpler, while leveraging advanced technologies such as artificial intelligence.

Streamlining data protection

Not only are expert technology executives navigating the complexity of a hybrid, multicloud environment, but so are less technical employees across any given organization, leaving room for human error on each workstation and at every virtual interaction. While most companies conduct training on basic cybersecurity threats like phishing and vulnerability scanning (e.g., don’t click the link), accidents happen and employees can still slip up by making minute changes, leaving their company’s sensitive data and entire infrastructure at risk.

Indeed, as companies navigate the complexity of multicloud environments, it’s easy to understand why it can be an uphill climb for employees to turn training into action when it comes to cybersecurity. While security experts will always need to be part of the equation to ensure a secure multicloud environment, security is automated to a large degree, with highly configurable settings that can detect threats — and even anticipate them. But this can lead to false confidence and complacency, which is especially true if we think about the fact that new vulnerabilities often capitalize on existing vulnerabilities that may have been detected but not fully eliminated. Prevention is always better than a cure as cures can be incomplete. AI is increasingly valuable for preventing cyber-attacks before they’re allowed to propagate. 

Embracing new AI tools to automate cyber protections 

For any company, managing cybersecurity risk can seem overwhelming under the best of circumstances; however, today’s threat landscape has never been greater, and attackers are increasingly dangerous for sophisticated and agile with lasting, devastating consequences. 

Companies today need to automate their hybrid, multicloud monitoring and threat response to embed an extra level of protection that triages red flags before they escalate and cause irreparable damage. Today’s AI-supported cloud tools can automatically stress test a company’s cybersecurity posture, maintain regular risk assessments, and manage new threats. These automated solutions can remove bottlenecks to enable more efficient data collection, accelerate AI workloads and deliver smoother cloud integration. Ultimately, companies with a high level of AI-driven security protocols can future-proof their cloud networks so they can scale efficiently, without downtime while data is moved between clouds and between data centers and the cloud freely and safely – without downtime and without lost productivity. 

Simplifying with an evolved cloud approach

While AI has done much of the heavy lifting to keep data secure, security teams still need to mind the store. But they need tools to help them do this. In an evolved cloud state, cloud is fully integrated into your architecture and operations, rather than another walled garden. Applications can pull data effortlessly from multiple clouds, data can move freely, securely and consistently between clouds to keep business logic moving forward, and businesses can quickly adapt to deliver on outcomes in a dynamic macro environment. This delivers observability everywhere so businesses can maximize the benefits of their multicloud architecture more purposefully and strategically, while simplifying cybersecurity.

As cloud advancements abound complexity increases, and many companies managing critical data remain unprepared. Gone are the days of the reactionary “act now, think later” approach to cloud integrations and threats to security. Rather, business leaders looking to capitalize on multicloud environments must take the time to consider how to overcome cloud complexity and look ahead to what’s yet to come. From simple changes to advanced AI, companies can remove blind spots and security vulnerabilities that mitigate risk and free up time for innovation and growth initiatives. As the multicloud evolves, the question remains: Who will choose to evolve with it?   

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) cloud security employee training hybrid security systems threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mignona Cote is the Chief Information Security Officer at NetApp. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • touch screen

    Access control in a hybrid-cloud environment

    See More
  • 5 minutes with Jain

    5 minutes with Vishal Jain - Navigating cybersecurity in a hybrid work environment

    See More
  • remote work

    What you cannot see you cannot secure: Shining a light on cybersecurity threats in a work-from-home environment

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing