Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity News

Protecting the Cloud

cloud and security
Getty Images
Poca Wander Stock/iStock / Getty Images Plus via Getty Images
July 14, 2023

One of the technologies that has been instrumental in facilitating smart buildings has been the emergence of “the cloud.” From computing to storage, the cloud allows for a lot of applications to run and interact with one another, often forming the backbone of a smart environment.

According to the second annual State of Cloud Report recently released by Pluralsight, multi-cloud strategies are becoming increasingly commonplace, with more than 65% of organizations currently operating within multi-cloud environments and another 20% saying they’re actively pursuing an additional cloud platform for their cloud environment.

A large majority (71% ) of respondents — comprising more than 1,000 technologists and leaders around the world — said they expect their cloud budgets to increase of the next 12 months and 74% expect their cloud skills development budgets to increase in parallel.

That is key, since the report also identified some skills gaps when it comes to cloud, the largest of which were cited in data, analytics, engineering and storage (42%), followed by security and governance (37%). 

The general consensus about cloud and security is that the cloud is at least as secure as other methods. However, no technology is free from vulnerabilities. 

For example, a report from Gigamon analyzed the difference between how secure an organization perceives itself to be and how secure it actually is. The report found that while surface-level confidence around hybrid cloud security is high, with 94% of global respondents stating their security tools and processes provide them with complete visibility and insights into their IT infrastructure, in practice, IT and security professionals don’t spot almost one third of security breaches.

Ninety-three percent predict cloud security attacks are only going to increase, and 90% had experienced a breach in the last 18 months. Moreover, 31% of breaches are being identified later down the line, rather than preemptively using security and observability tools — either by data appearing on the dark web, files becoming inaccessible or users experiencing slow application performance (likely due to DoS or inflight exfiltration). This number rises to 48% in the U.S.

Another report from Thales, had similar findings, with more than a third (39%) of businesses experiencing a data breach in their cloud environment last year, an increase on the 35% reported in 2022. In addition, human error was reported as the leading cause of cloud data breaches by over half (55%) of those surveyed.

More concerning, companies are storing more and more sensitive data in the cloud, with 75% of businesses stating that more than 40% of their data stored in the cloud is classified as sensitive, compared to 49% of businesses this time last year. More than a third (38%) ranked Software as a Service (SaaS) applications as the leading target for hackers, closely followed by cloud-based storage (36%).

And fewer are using strong encryption for this sensitive data, with just 22% saying that more than 60% of their sensitive data in the cloud is encrypted. 

On the positive side, adoption of robust multi-factor authentication (MFA) has risen to 65%, indicating progress in fortifying access controls. Forty-one percent of organizations have implemented zero trust controls in their cloud infrastructure, but an even smaller percentage (38%) utilizes such controls within their cloud networks.

The cloud is a growing and critical infrastructure tool to smart environments — and it is going to need to become a priority to secure it.

KEYWORDS: cloud cloud security smart buildings

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cloud-security-fp1170x658v05.jpg

    Protecting the modern cloud environment with cloud email security

    See More
  • cloud security

    Security without borders: Protecting cloud apps

    See More
  • Cloud security

    World Cloud Security Day: Breaking Down the State of Cloud Cybersecurity and Physical Security

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing