Sign up to save tools and stay up to date with the latest in AI
bg
bg
1

Multi-Cloud Environments: How Secure Are They?

Jan 27, 2025 - forbes.com
The article discusses the growing trend of multi-cloud environments as organizations seek flexibility and leverage best-of-breed services from different cloud providers. While multi-cloud adoption offers benefits like reduced vendor lock-in and improved flexibility, it also introduces significant complexity and heightened security risks. A study by Orca Security reveals that many organizations are already using hybrid and public cloud approaches, with a substantial number employing multiple security tools to protect their infrastructure. Key drivers for multi-cloud adoption include mergers and acquisitions, financial incentives from cloud providers, and the need for specific technology fits.

However, the transition to multi-cloud environments increases cyber risk exposure due to factors like increased complexity, data inconsistency, larger attack surfaces, and sophisticated attack chains involving multiple clouds. To mitigate these risks, organizations are advised to develop a unified security strategy, adopt a risk-centric approach, understand known attack paths, and leverage AI to enhance security measures. As multi-cloud environments become the norm, managing their associated risks is essential for businesses to ensure robust security in an interconnected world.

Key takeaways:

  • Organizations are increasingly adopting multi-cloud environments for flexibility and leveraging best-of-breed services, despite the increased complexity and security risks.
  • Key drivers for multi-cloud adoption include M&A activity, financial incentives from cloud providers, and technology fit for specific applications.
  • Multi-cloud environments increase cyber risk exposure due to factors like increased complexity, data inconsistency, larger attack surfaces, and cross-cloud attack chains.
  • To mitigate risks, organizations should develop a unified security strategy, take a risk-centric approach, understand known attack paths, and leverage AI for enhanced security.
View Full Article

Comments (0)

Be the first to comment!