August 18, 2016 By Douglas Bonderud 2 min read

Ask companies about the biggest downside to adopting public cloud computing and the same answer comes up over and over: security. Despite over a decade of cloud advancement and the rise of niche solutions such as security-as-a-service, IT professionals and C-suite members alike are still reluctant to fully embrace public alternatives.

According to ZDNet, however, a recent survey discovered that attitudes may finally be changing. Fifty-one percent of respondents said cloud security was better than on local stacks, and 58 percent argued that public options are the “most secure.” Yet over half still said concerns about data security prevented earlier cloud adoption. What will it take for clouds to finally get the all-clear?

A Shift Is Underway

Cloud adoption is on the rise, noted CloudTech, with 50 percent of those surveyed saying they plan to bump up public usage by 25 percent in the next three years and another one-quarter of respondents planning for a 50 percent usage increase over the same time period.

There is a shift underway, since “all signs point to public cloud adoption growing and enterprise IT becoming more comfortable with the prospect of running their most sensitive data on public cloud infrastructure,” according to Tony Safolan, president of SADA Systems, the organization that conducted the new study. Nonetheless, data security is a consistent touchpoint for all IT pros considering a move to the cloud.

Fact Versus Feeling

So where’s the disconnect? It comes down to fact versus feeling. As noted by InfoWorld, cloud providers understand that a single data breach or security incident could sink their brand and their business. As a result, they spend big money and invest substantial time to develop secure server architecture and ensure data is encrypted, isolated and effectively unassailable — even in the event of government warrants.

What’s more, the centralized model of public clouds makes it possible to quickly deploy patches or hotfixes. Cloud providers are typically on the leading edge of security tech, since it’s a make-or-break investment for their product.

There’s little doubt that public services are, in fact, more secure than on-premises options. But the feeling of moving data off-site and the worry that comes with it still makes IT professionals uneasy. Companies invest, but they’re not always comfortable.

Securing the Public Cloud

Despite their unease, IT professionals now recognize the benefits of shared computing architecture for both sheer computing power and data security. As a result, public cloud spending is on the rise.

But that doesn’t mean the quest to improve cloud security is over. In fact, the opposite is true: Public services are now high-value targets for cybercriminals looking to steal keys to the digital kingdom and swipe corporate data. As a result, both local IT professionals and cloud providers have a vested interest when it comes to locking down the cloud and ensuring new threats can’t gain a foothold.

For example, next-gen endpoint firewalls and unified threat management (UTM) solutions are rapidly becoming commonplace. Under new shared responsibility models, providers work alongside local professionals to discover new security threats and implement controls — such as context-based detection methods and identity-based access approaches — in an effort to improve total cloud security.

Cloud adoption is up, but cloud comfort hasn’t quite caught up. As IT professionals experience cloud protection firsthand and become an integral part of the security discussion, however, expect feelings to align more closely with public cloud facts.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today