August 22, 2016 By Douglas Bonderud 2 min read

Companies are still worried about cloud security risks. It makes sense: Moving data off-site always comes with the specter of loss or compromise, and many enterprises struggle with the notion of giving up any measure of security control.

As noted by ZDNet, however, a new Deloitte report may show the first signs of security slipping out of the top spot. Just 24 percent of respondents said security risk was the biggest factor in putting off cloud adoption. More than a quarter, meanwhile, tagged integration of existing apps and infrastructure as the largest obstacle to cloud uptake. Are security risks finally losing steam as cloud services evolve?

Security Risks Still a Concern

While companies are more willing to embrace the idea of security in the cloud, this doesn’t mean IT pros are slapping on rose-colored glasses and putting their feet up. In fact, those surveyed this year reported a “significant increase” in the use of data encryption and employee security training, while 55 percent said improvements to information security now drive much of their technology investment.

According to Baseline magazine, companies remain concerned about access controls — 53 percent cited difficulties managing and restricting access to sensitive data, up from 48 percent just two years ago. What’s more, almost half of businesses said that cloud services are deployed by departments other than IT, making it difficult to track usage or protect sensitive data.

Companies remain aware of security risks but are no longer allowing concern about public services to cloud their judgment when it comes to adoption. Instead, they’re devoting more time to training, focusing on security investment and keeping track of emergent threats.

A Perceptual Shift

To effectively embrace the new cloud services market, however, companies need more than the absence of worry. A perceptual shift is required if IT departments hope to chart new digital courses.

As noted by IT Pro Portal, one key aspect of this change stems from the recognition that tools and technology can’t secure cloud data in isolation. Governance now plays a critical role. How employees and executives interact with cloud-based applications is more important than where these services are located since physical server stacks often provide greater access to determined cybercriminals.

According to Computer Business Review, meanwhile, there’s an increasing emphasis on role-based access, rather than encryption, to enhance cloud protection. While encryption remains a critical step in the process, it’s not the final point. By implementing more granular access controls and assigning permissions on an as-needed basis, it’s possible for security professionals to take charge of critical cloud security policies while delegating more repetitive tasks to third-party providers.

There’s an attitude adjustment underway when it comes to cloud security risks. True transformation, however, demands both recognition of critical threats and a re-imagining of essential cloud controls.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today