Hello JBers! As the importance of the cloud grows in business operations, securing cloud infrastructures is becoming increasingly critical across various sectors. In fact, 65% of security and IT management professionals consider cloud computing security a top priority today, and 72% believe its importance will continue to rise in the future.
This information comes from the 2024 Thales Cloud Security Study, the fourth annual report exploring the latest trends and challenges in cloud security. With input from 3,000 respondents across 18 countries and 37 industries, this report provides an in-depth view of the current state and future concerns of cloud computing security across businesses of all sizes.
Multi-Cloud Complexity
The complexity of cloud environments in enterprises is one of the main reasons why cloud security is gaining more attention. The demand for various cloud computing approaches has created a diverse market where a single organisation might rely on multiple service providers, each with unique security requirements.
The study reveals that while multi-cloud adoption remains high, it has slightly declined compared to 2023, with the average number of cloud providers per enterprise dropping from 2.26 to 2.02. This trend is observed across industries such as banking, financial services, and insurance.
On the other hand, SaaS (Software as a Service) usage is on the rise. More than 60% of respondents use over 25 SaaS applications, and 30% depend on more than 50. Securing these applications and the data they handle presents unique challenges, adding to the complexity of managing privacy and data protection in cloud environments.

Cyber Attacks Targeting the Cloud
Respondents revealed that cloud resources are among the top targets for cyberattacks, followed closely by identity infrastructure. Attacks on cloud management infrastructures saw the most significant increase, with 72% of respondents noting this rise.
When these infrastructures are compromised, the risks are severe. Attackers can navigate cloud environments undetected and even disable critical auditing or monitoring functions.
The Human Factor in Cloud Security
Identity and Access Management (IAM) plays a vital role in linking people, technology, and policy controls. However, human interaction with technology often introduces significant risks, with human error being a leading cause of cloud data breaches.
In fact, 44% of respondents experienced a cloud data breach, and 31% attributed it to misconfigurations or human error. This highlights the importance of robust IAM solutions and comprehensive training to mitigate human-related risks.
Investment Trends
Investment priorities reflect the importance of securing data, identities, and access in cloud environments. Security for IaaS and PaaS environments tops the list at 33%. However, there remains some hesitation in adopting modern cloud security controls.
Traditional tools such as endpoint security and workforce IAM are still widely used, suggesting a reliance on familiar solutions over newer, cloud-native security measures. This reluctance may hinder the overall effectiveness of cloud computing security strategies.
Encryption is Lagging
Despite the critical importance of data security, encryption adoption remains low. Fewer than 10% of enterprises encrypt more than 80% of their cloud data. Additionally, the multitude of key management systems further complicates the security landscape.
This gap in encryption practices presents significant risks, especially as the volume of sensitive data in the cloud continues to grow.
Focusing on Proactive Security
To improve the security of cloud environments, organisations can take the following steps:
- Promote Proactive Security: Implement proactive measures to achieve better outcomes, such as ensuring compliance with security audits to reduce the risk of data breaches.
- Strengthen Understanding of New Technologies: Invest in understanding and deploying modern cloud security solutions such as CNAPP and advanced encryption techniques.
- Foster Cross-Team Collaboration: Enhance cooperation between development and security teams to address new threats and vulnerabilities.
- Centralise Tools for Decentralised Teams: Provide consistent security tools and controls to enable decentralised teams to manage risks effectively.
Cloud computing security is dynamic and complex. However, by prioritising proactive security measures, adopting modern solutions, and fostering strong team collaboration, organisations can better protect their cloud environments and safeguard valuable data.
Feel free to share this article on your social media to raise awareness about the importance of cloud computing security! It could be the first step towards protecting data together.