SecureITWorld (1)
Sign Up

We'll call you!

One of our agents will call you. Please enter your number below

JOIN US



Subscribe to our newsletter and receive notifications for FREE !




    Sign up to stay tuned and to be notified about new releases and blogs directly in your inbox. We hate spam too, unsubscribe at any time! Click here for Privacy Policy.

    SecureITWorld (1)
    Sign Up

    JOIN US



    Subscribe to our newsletter and receive notifications for FREE !




      Sign up to stay tuned and to be notified about new releases and blogs directly in your inbox. We hate spam too, unsubscribe at any time! Click here for Privacy Policy.

      Cloud Resources have Become Biggest Targets for Cyberattacks, Finds Thales

      Thales: Cloud security threats target sensitive data

      Business Wire India

      • Cloud Security spending now tops all other security spending categories
      • Nearly half (47%) of all corporate data stored in the cloud is sensitive
      • 44% of organizations have experienced a cloud data breach with 14% having had one in past year
      • Nearly half of organizations cite it is more difficult to manage compliance and privacy in the cloud vs. on-premises
      • Nearly a third (31%) of organizations recognise the importance of digital sovereignty initiatives as a means of futureproofing their cloud environments

      Thales today announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries.

      This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240625475927/en/

      As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines.

      This comes as organizations continue to experience cloud data breaches. Forty-four percent of organizations have experienced a cloud data breach with 14% reported having an incident in the last 12 months. Human error and misconfiguration continued to lead the top root cause of these breaches (31%), followed by exploiting known vulnerabilities (28%), and failure to use Multi-Factor Authentication (17%).

      Growing cloud usage across enterprises has seen an accompanying growth in the potential attack surface for threat actors, with 66% of organizations using more than 25 SaaS applications and nearly half (47%) of corporate data being sensitive. Despite the increased risks to sensitive data in the cloud, the data encryption rates remain low, with less than 10% of enterprises encrypting 80% or more of their sensitive cloud data.

      Sebastien Cano, Senior Vice President for Cloud Protection and Licensing activities at Thales: “The scalability and flexibility that the cloud offers is highly compelling for organizations, so it’s no surprise it is central to their security strategies. However, as the cloud attack surface expands, organizations must get a firm grasp on the data they have stored in the cloud, the keys they’re using to encrypt it, and the ability to have complete visibility into who is accessing the data and how it being used. It is vital to solve these challenges now, especially as data sovereignty and privacy have emerged as top concerns in this year’s research.”

      As organizations gain more experience in using cloud computing, many have modernized their investments to meet new security challenges. For organizations that prioritized digital sovereignty as an emerging security concern, refactoring applications to logically separate, secure, store, and process cloud data was the top way they would attain or achieve sovereignty initiatives ahead of other measures such as repatriating workloads back to on-premises or in-territory. Future-proofing cloud environments (31%) was the number one driver behind digital sovereignty initiatives, while adhering to regulations came in at a distant second at 22%.

      For more information listen to our webinar with S&P Global hosted by Scott Crawford, Information Security Research Head and Justin Lam, Research Analyst.

      About the 2024 Thales Cloud Security Study
      The 2024 Thales Cloud Security Study was based on a global survey of 2961 respondent, aimed at professionals in security and IT management. In addition to criteria about level of knowledge on the general topic of the survey, the screening criteria for the survey excluded those respondents who indicated affiliation with organizations with annual revenue of less than US$100 million and with US$100 million-$250 million in selected countries. This research was conducted as an observational study and makes no causal claims.

      About Thales

      Thales (Euronext Paris: HO) is a global leader in advanced technologies specialized in three business domains: Defence & Security, Aeronautics & Space, and Cybersecurity & Digital identity.

      It develops products and solutions that help make the world safer, greener and more inclusive.

      The Group invests close to €4 billion a year in Research & Development, particularly in key innovation areas such as AI, cybersecurity, quantum technologies, cloud technologies and 6G.

      Thales has close to 81,000 employees in 68 countries. In 2023, the Group generated sales of €18.4 billion.

      PLEASE VISIT

      Thales Group

      Cloud Protection & Licensing Solutions | Thales Group

      Cybersecurity Solutions | Thales Group

      Read More: WNS Announces Addition of Anil Chintapalli as Executive Officer and Head of Strategic Growth Initiatives




        Sign up to stay tuned and to be notified about new releases and blogs directly in your inbox. We hate spam too, unsubscribe at any time! Click here for Privacy Policy.

        Popular Picks


        Recent Blogs

        Recent Articles


        Copyright © 2024 SecureITWorld . All rights reserved.

        Scroll to Top