August 18, 2016 By Douglas Bonderud 2 min read

Ask companies about the biggest downside to adopting public cloud computing and the same answer comes up over and over: security. Despite over a decade of cloud advancement and the rise of niche solutions such as security-as-a-service, IT professionals and C-suite members alike are still reluctant to fully embrace public alternatives.

According to ZDNet, however, a recent survey discovered that attitudes may finally be changing. Fifty-one percent of respondents said cloud security was better than on local stacks, and 58 percent argued that public options are the “most secure.” Yet over half still said concerns about data security prevented earlier cloud adoption. What will it take for clouds to finally get the all-clear?

A Shift Is Underway

Cloud adoption is on the rise, noted CloudTech, with 50 percent of those surveyed saying they plan to bump up public usage by 25 percent in the next three years and another one-quarter of respondents planning for a 50 percent usage increase over the same time period.

There is a shift underway, since “all signs point to public cloud adoption growing and enterprise IT becoming more comfortable with the prospect of running their most sensitive data on public cloud infrastructure,” according to Tony Safolan, president of SADA Systems, the organization that conducted the new study. Nonetheless, data security is a consistent touchpoint for all IT pros considering a move to the cloud.

Fact Versus Feeling

So where’s the disconnect? It comes down to fact versus feeling. As noted by InfoWorld, cloud providers understand that a single data breach or security incident could sink their brand and their business. As a result, they spend big money and invest substantial time to develop secure server architecture and ensure data is encrypted, isolated and effectively unassailable — even in the event of government warrants.

What’s more, the centralized model of public clouds makes it possible to quickly deploy patches or hotfixes. Cloud providers are typically on the leading edge of security tech, since it’s a make-or-break investment for their product.

There’s little doubt that public services are, in fact, more secure than on-premises options. But the feeling of moving data off-site and the worry that comes with it still makes IT professionals uneasy. Companies invest, but they’re not always comfortable.

Securing the Public Cloud

Despite their unease, IT professionals now recognize the benefits of shared computing architecture for both sheer computing power and data security. As a result, public cloud spending is on the rise.

But that doesn’t mean the quest to improve cloud security is over. In fact, the opposite is true: Public services are now high-value targets for cybercriminals looking to steal keys to the digital kingdom and swipe corporate data. As a result, both local IT professionals and cloud providers have a vested interest when it comes to locking down the cloud and ensuring new threats can’t gain a foothold.

For example, next-gen endpoint firewalls and unified threat management (UTM) solutions are rapidly becoming commonplace. Under new shared responsibility models, providers work alongside local professionals to discover new security threats and implement controls — such as context-based detection methods and identity-based access approaches — in an effort to improve total cloud security.

Cloud adoption is up, but cloud comfort hasn’t quite caught up. As IT professionals experience cloud protection firsthand and become an integral part of the security discussion, however, expect feelings to align more closely with public cloud facts.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today