Assess your organization's ransomware readiness with the Offensive Security Guide. DOWNLOAD THE GUIDE ›

CyberRisk Alliance Cloud Adoption Security Report

Explore key findings and insights from the CRA Business Intelligence Cloud Security Survey of more than 300 security leaders & practitioners.

CyberRisk Alliance Survey Report cover page and preview of internal page with graph. The cover title is "As Cloud Adoption Surges, Can Security Keep Pace?"

As Cloud Adoption Surges, Can Security Keep Pace?

With cloud use on the rise, criminals and other threat actors have shifted their tactics to cloud data and systems. If organizations are going to successfully adopt cloud or continue their transition, they must ensure security is part of their program. However, many organizations grapple with how to successfully manage and secure their cloud infrastructure.

CyberRisk Alliance Business Intelligence recently surveyed more than 300 U.S. security leaders and practitioners to understand the current state of cloud security. The results highlight the struggle faced by many organizations: cloud computing is the future, yet the tools, processes and internal skillsets aren't quite in place when it comes to successfully securing the cloud.

Among the key findings:

  • 37% of respondents reported their organization experienced at least one cloud-based attack or breach in the last two years
  • 72% of respondents are "very concerned" or "extremely concerned" about securing their cloud assets/workloads over the next 12 months
  • Lack of detection and response capabilities in the cloud is the top security concern cited

Download the report to read all the survey results, as well as best practices for securing cloud systems

Learn more about our Cloud Penetration Testing (CPT) service to understand how CPT can help you uncover the risks to your business.


Extend Your Knowledge

Check out these related resources.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.