theNet by CLOUDFLARE

Cloud implications for business security

The pivotal role of cloud computing in shaping business and digital transformation is unmistakable. Companies continue to rely on the cloud's agility and scalability to support their key business objectives.

Now organizations are increasingly integrating artificial intelligence (AI) capabilities within cloud environments. This convergence of cloud and AI will not only increase the demand for cloud services but also compound cloud security challenges.

Technology leaders should examine the trends in cloud and security to address two challenges in particular: the increasingly sophisticated nature of security threats and the imperative of maintaining control across multiple cloud platforms.


Adapting to the new norms of cloud security

The cloud and security landscape continues to evolve. Even as some companies encourage employees to return to offices, organizations continue to support hybrid work — and that contributes to ongoing adoption of SaaS and cloud solutions.

Meanwhile, the rise in ransomware and AI-enhanced email phishing has spurred the need for more sophisticated security measures. Organizations are increasingly adopting decentralized models like secure access service edge (SASE) to implement zero trust frameworks, integrating advanced phishing protection, cloud access security broker (CASB) solutions, and data loss prevention (DLP) to enhance user and data security in the cloud. The shift toward adopting DevSecOps and incorporating security into every software development stage is pivotal. These trends underscore cloud security's ongoing complexity and dynamism and the need for more adaptable, robust defenses in this continually changing environment.


New and emerging threats and security challenges

While certain aspects of cloud security are somewhat “business as usual,” the sector is not without its exceptional challenges. There continues to be an upsurge in distributed denial-of-service (DDoS) attacks, both in frequency and magnitude. Some of the largest-ever attacks were recorded in 2025. In addition, DDoS botnets are increasingly harnessing the power of cloud infrastructure, further amplifying their destructive capacity and compounding problems for their targets.

Cloud security has also been strained by ongoing regional and global conflicts, fostering a climate of hacktivism. Geopolitical turbulence has made securing cloud services more complicated, particularly when the primary objective of these cyber attacks appears to be the disruption of critical infrastructure services in foreign territories.

Cloud consumers should brace for a spectrum of new and intensifying threats. Notably, the prevalence of AI-enhanced social engineering and email phishing is a concerning trend. Social engineering attacks seriously impacted several major companies in the past few years, causing significant compromises and data loss. Meanwhile, advancements in quantum computing pose a looming threat to the continued efficacy of current encryption algorithms, potentially putting the confidentiality of data stored in the cloud at risk. This technological advancement intersects with a complex mix of new compliance, privacy, and data sovereignty regulations, often conflicting, thus intensifying the challenges companies face in maintaining data security and compliance.Integrating and managing diverse cloud-based security tools has become increasingly daunting. Compounding the difficulty, we find a persistent talent shortage in cloud security, underscoring an expanding knowledge gap. This shortage, combined with the fast pace of technological innovation and the changing nature of cyber threats, suggests that this gap may worsen before it improves.


Strategies for enhancing cloud security for businesses

In response to the escalating sophistication of threats, especially those augmented by AI, businesses are recalibrating their cloud security strategies. These strategies include:

  • User protection and education: Organizations should equip users with the knowledge and tools to recognize and resist AI-enhanced phishing and social engineering attacks. Incorporating AI into security tool stacks can help upskill teams and streamline detection and response to counter the threat posed by adversarial AI.

  • Zero trust: Investment in a zero trust architecture is a crucial cybersecurity strategy. It can help ensure rigorous identity verification for every user and device attempting to access cloud resources, irrespective of the network architecture in place.

  • Simplifying and auditing processes: Simplifying security processes can make things more transparent and manageable, while regular audits ensure that security measures are up to date and effective against emerging threats. Periodic audits can also uncover often-neglected areas of cloud infrastructure, such as unsecured APIs, misconfigured storage buckets, and abandoned cloud infrastructure — all vulnerabilities that can serve as entry points for attackers if left unchecked.

By optimizing cloud security strategies, organizations can adjust to a new normal and better prepare themselves for what may lie ahead.


The new normal of cloud security

The developments in cloud computing have brought significant changes, highlighting the need for robust, dynamic security strategies. The emergence of AI-enhanced threats and attackers leveraging cloud infrastructure in their attacks underscore the need for ongoing adaptation and improvement in cloud security. As cloud computing's role in business continues to grow, so does the need for vigilant, proactive, and adaptable cloud security practices. Looking ahead, building resilient, forward-looking cloud security strategies will be vital in navigating the complex world of cloud security and harnessing its full potential while minimizing risks for businesses.

Securing the expanding corporate perimeter is hard. With Cloudflare’s Zero Trust Network Access, you can give your entire ecosystem of users faster, safer access to corporate resources.

This article is part of a series on the latest trends and topics impacting today’s technology decision-makers.



Dive deeper into this topic.

Learn more about zero trust and start planning a roadmap for your organization with the complete guide, A roadmap to zero trust architecture.

Get the guide!



Key takeaways

After reading this article you will be able to understand:

  • The forecasted growth in cloud services

  • What the new normal of cloud security looks like

  • A myriad of security advancements that organizations are adopting



Receive a monthly recap of the most popular Internet insights!