Artificial IntelligenceCybersecurityNewswireTechnology

Cloud Security Is Lagging Behind

Originally published on: December 24, 2025
▼ Summary

– Cloud environments are now the primary operating environment for production workloads, with multicloud and hybrid architectures creating complex, constantly changing security landscapes.
– Development cycles have accelerated, often outpacing security controls and leading to high-severity vulnerabilities reaching production, while fixes remain slow.
– Data exposure is primarily driven by fragmented environments, overly broad identity permissions, and weak secret handling, often occurring through everyday business tools.
– Security teams face strained incident response due to disconnected tools and workflows, with API-related attacks and identity threats rising significantly.
– The widespread adoption of AI expands the attack surface through new risks in its supporting infrastructure and accelerates attackers by automating malicious activities.

The rapid adoption of cloud technologies has created a significant security gap, where development velocity far outpaces the implementation of protective controls. A recent industry study reveals that security teams are grappling with compressed development cycles, widespread cloud sprawl, and sophisticated attacks that can execute breaches in mere minutes. This dynamic leaves critical systems and sensitive data increasingly vulnerable.

Production workloads now predominantly operate within cloud environments, with public cloud services hosting a growing volume of essential business functions. It is rare for an enterprise to depend on just one provider; multicloud strategies and hybrid architectures have become the standard. These complex estates blend virtual machines, containers, and serverless functions, forcing security professionals to manage identities, permissions, and configurations across layers that are in a constant state of flux. The resulting operational complexity is now a primary source of risk.

The pace of software deployment exacerbates these challenges. Weekly or even daily code pushes are commonplace, and the integration of generative AI tools introduces massive amounts of machine-generated code into already fast-moving pipelines. Security teams frequently struggle to enforce guardrails before release, allowing high-severity issues to slip into production. This happens when pre-deployment controls cannot keep up with delivery speed or fail to integrate smoothly with continuous integration and deployment workflows. Developer pushback and overwhelming alert noise create additional friction. Once a vulnerability is live, remediation is slow; most organizations require over a week to deploy a fix, and few prioritize issues based on actual runtime context, leaving teams unsure which flaws demand immediate attention.

Data exposure is closely tied to identity management and environmental sprawl. Security leaders cite fragmented environments as their top data security concern, followed by excessively broad identity permissions and poor secret management. These problems permeate cloud accounts, SaaS platforms, and automation tools. Manual processes for discovering sensitive data are still widespread, creating dangerous blind spots at cloud scale. As data flows between systems without consistent tagging or a reliable inventory, enforcement and early detection become extraordinarily difficult. Data loss often occurs through legitimate business tools, with misuse of SaaS synchronization features, oversharing, and compromised credentials representing common exfiltration paths. While direct public exposure still happens, identity-driven issues are now more prevalent.

The strain on incident response capabilities is evident. Every organization in the study experienced multiple security incidents over the past year, with API-related attacks growing faster than any other category. This surge reflects increased automation and the proliferation of interfaces. Identity-based threats and persistent intrusions also rose significantly. While teams often detect and contain threats within a day, fully resolving incidents takes much longer. Analysts waste considerable time gathering and correlating data from disconnected tools, which delays critical decisions during active attacks. Furthermore, cloud security, application security, and security operations center teams frequently operate in silos with separate workflows, making it hard to construct a unified timeline of an attack’s progression across different environments.

The integration of artificial intelligence introduces a new frontier of risk. AI systems are embedded directly into existing cloud infrastructure at most organizations, with security leaders highlighting risks in the underlying cloud platforms and CI/CD pipelines that support model training and deployment. Data protection and regulatory compliance are major subsequent concerns. Attacks targeting AI systems are widespread, employing techniques like data leakage through assistants, supply chain tampering, token abuse, and prompt manipulation. Many of these methods exploit exposed APIs and permissive access controls rather than fundamental flaws in the AI models themselves. The research also underscores how AI empowers attackers, using tools that generate convincing phishing content, automate reconnaissance, and exploit interfaces to drastically reduce the time from initial access to significant impact.

(Source: HelpNet Security)

Topics

cloud security 95% security team struggles 92% development speed 90% data exposure 89% operational complexity 88% ai security risks 88% Generative AI 87% ci/cd security 86% ai attacks 85% multicloud usage 85%