Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»Tools»Business cloud security failures are 'alarming' – as AI threats accelerate
Tools

Business cloud security failures are 'alarming' – as AI threats accelerate

CloudSecNewsHubBy CloudSecNewsHubJune 12, 2024No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Business Cloud Security Failures Are 'alarming' As Ai Threats
Share
Facebook Twitter LinkedIn Pinterest Email

blackdofx/Getty Images

Just under 45% of organizations conduct regular audits and assessments to ensure their cloud environment is secure, which is a “concern” as more applications and workloads move to multi-cloud platforms.

When asked how they monitor risks across their cloud infrastructure, 47.7% of companies cited automated security tools while 46.5% relied on native security offerings from service providers. Another 44.7% said they conducted regular audits and assessments, according to a report from security firm Bitdefender.

Also: Artificial Intelligence is changing cybersecurity and companies must take notice of the threat

The study, which included more than 1,200 IT and security professionals, including chief information security officers in six markets: Singapore, the United Kingdom, France, Germany, Italy and the United States, revealed that about 42.1% of them worked with external experts.

Paul Hadji, Bitdefender's vice president for Asia Pacific and cybersecurity services, said in response to ZDNET's questions that it is “certainly concerning” that only 45% of companies conduct regular audits of their cloud environments.

Haji noted that overreliance on cloud providers' ability to protect hosted services or data continues even as companies continue to move applications and workloads to multi-cloud environments.

“Most of the time,[cloud providers]are not as responsible as you might think, and in most cases, the data stored in the cloud is often large and sensitive,” Haji said.

“Responsibility for cloud security, including how data is protected at rest or in motion, the identities (of people), servers and endpoints granted access to resources, and compliance rests mostly with the customer. It is important to first establish a baseline identifying current risks and vulnerabilities in the environments.” Your cloud based on things like geography, industry, and supply chain partners.”

Among the top security concerns respondents had in managing their company's cloud environments, 38.7% cited identity and access management while 38% cited the need to maintain cloud compliance. The study found that another 35.9% described shadow IT as a concern, while 32% were concerned about human error.

However, when it comes to AI-related generative threats, participants seem confident in their teammates' ability to identify potential attacks. A majority of 74.1% believed that colleagues in their department would be able to detect a fake video or audio attack, with US respondents showing the highest level of confidence at 85.5%.

Also: Program faster with generative AI, but beware of the risks when doing so

In comparison, only 48.5% of their counterparts in Singapore were confident that their teammates could spot deepfakes – the lowest percentage among the six markets. In fact, 35% in Singapore said colleagues in their department would not be able to identify a deepfake, the highest rate in the global group to say the same.

Was the global average of 74.1% who were confident in their teammates' ability to spot deepfakes misplaced or misplaced?

Haji noted that this confidence was expressed even though 96.6% viewed GenAI as a minor to very major threat. The basic explanation for this, he said, is that IT and security professionals don't necessarily trust the ability of users outside their teams — who aren't in IT or security — to spot deepfakes.

“That is why we believe that technology and processes (implemented) together are the best way to mitigate these risks,” he added.

In response to a question about how effective or accurate current tools are in detecting AI-generated content such as deepfakes, he said this will depend on several factors. He explained that if it is delivered via a phishing email or included in a text message containing a malicious link, the deepfake should be quickly identified by endpoint protection tools, such as XDR (Extensible Detection and Response) tools.

However, he noted, threat actors rely on natural human tendencies to believe what they see and what people they trust, such as celebrities and high-profile figures — whose images are often manipulated to communicate messages — endorse.

Also: 3 ways to accelerate and improve your generative AI implementation

As deepfake technologies continue to develop, he said it would be “almost impossible” to detect such content by sight or sound alone. He stressed the need to develop technology and processes that can detect deepfakes as well.

Although respondents in Singapore were the most skeptical of their teammates' ability to detect deepfakes, he noted that 48.5% is a high number.

Haji once again urged the importance of having both technology and processes in place, saying: “Deepfakes will continue to improve, and detecting them effectively will require sustained efforts that bring together people, technology and processes that work together. In cybersecurity, there is no ‘silver bullet’ – it is always a strategy.” “Multi-layered, starting with strong prevention of closing the door before the threat enters.”

Training is also becoming increasingly important as more employees work in hybrid environments and more risks arise from homes. “Companies need to take clear steps to verify the authenticity of deepfakes and protect against highly targeted phishing campaigns,” he said. “Processes are key for organizations to help ensure double verification procedures are in place, especially in cases involving the transfer of large amounts of money.”

According to the Bitdefender study, 36.1% see GenAI as a very high threat in terms of manipulation or creating deceptive content, such as deepfakes. 45.1% described this as a moderate threat, while 15.4% said it was a minor threat.

Also: Nearly 50% of people want AI clones to do it for them

The vast majority, 94.3%, were confident in their organizations' ability to respond to current security threats, such as ransomware, phishing, and zero-day attacks.

However, the study revealed that 57% admitted they had experienced a data breach or leak in the past year, an increase of 6% on the previous year. This figure was lowest in Singapore at 33% and highest in the United Kingdom at 73.5%.

Phishing and social engineering were the top concern at 38.5%, followed by ransomware, insider threats, and software vulnerabilities at 33.5% each.

39alarming39 Accelerate Business cloud failures security Threats
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple is expanding its privacy leadership with new updates across its platforms
Next Article Purchasing Eureka is defensible to bring data security posture management to the cloud platform
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
News

The most prominent report: 2025 Experience of exposure to cloud data

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?