Navigating today’s cloud security challenges

Issue 1 2025 Information Security, Infrastructure

Cloud adoption lies at the heart of digital transformation, providing organisations with the agility and flexibility they need to stay competitive in today’s rapidly changing marketplace. Competing in a digital-first economy requires developing personalised customer experiences, embracing a more prominent work-from-anywhere (WFA) strategy, streamlining workflows, and optimising distributed operations for greater efficiency and scalability.

However, while the power of the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. These include safeguarding sensitive data, ensuring regulatory compliance, and maintaining visibility and control across increasingly complex hybrid and multi-cloud environments.

The release of the 2025 State of Cloud Security Report, sponsored by Fortinet and produced by Cybersecurity Insiders, provides a comprehensive analysis of the latest trends, challenges, and strategies shaping cloud security. Based on insights from over 800 cybersecurity professionals across industries and geographies, this report reveals what is driving hybrid and multi-cloud adoption, the evolving challenges organisations face, and actionable steps for securing these dynamic environments.

Many organisations navigating the challenges of cloud adoption recognise the importance of safeguarding their cloud-based initiatives. As a result, they are significantly increasing their cloud security investments in the coming year. They are channelling their resources to address critical security gaps, ensure compliance, and overcome technical complexities.

This article examines some key findings from the report, including how businesses worldwide are harnessing the cloud and how their security teams respond to cloud-related threats. It highlights the challenges companies face as they navigate their cloud adoption journey.

Hybrid and multi-cloud dominate

Cloud adoption continues to redefine IT operations, with hybrid and multi-cloud models emerging as the leading strategies for most organisations. According to the report, 82% of surveyed organisations now leverage cloud environments to achieve greater scalability, flexibility, and resilience. 

To that end, hybrid cloud adoption has risen to 54%, enabling organisations to integrate their on-premises systems with public cloud platforms. This approach lets organisations optimise the deployment of their applications based on their needs, striking a balance between control and compliance. For instance, IT teams can use public clouds for customer-facing applications, while keeping sensitive data safe in their private environments.

Cloud security challenges

While cloud adoption offers substantial benefits, it also brings significant security challenges, with 61% of respondents reporting that security and compliance concerns are their top barriers to cloud adoption. Misconfiguration, regulatory non-compliance, and data breaches are among the most pressing issues identified, especially as hybrid and multi-cloud environments expand. Compounding these challenges is the cybersecurity skills gap. A staggering 76% of organisations report a shortage of cloud security expertise and people resources, limiting their ability to deploy and manage comprehensive security solutions. This shortage not only underscores the need for targeted training and upskilling to bridge the gap, but also to rethink cloud deployment strategies to reduce complexity and increase security effectiveness.

This is even more critical when considering another critical weakness highlighted by the 2025 Cloud Security Report: real-time threat detection. Only 36% of respondents expressed confidence in their organisation’s ability to detect and respond to threats in their cloud environments. This lack of confidence highlights vulnerabilities in current architectures, especially in complex hybrid and multi-cloud setups.

Unified cloud security platforms

The State of Cloud Security Report emphasises implementing a unified cloud security platform strategy to tackle these challenges. An overwhelming 97% of respondents prefer centralised solutions that simplify policy management, enhance visibility, and ensure consistent enforcement across diverse environments.

As a result, organisations are urged to invest in acquiring and deploying a unified cloud platform. An ideal platform, like that offered by Fortinet, should deliver comprehensive 360-degree defence-in-depth protection and comprehensive visibility to help organisations fully understand their cloud environment, better operationalise their environment, and increase security effectiveness—all while reducing complexity.

Additionally, it should offer integrated capabilities like Cloud Security Posture Management (CSPM), Code Security, and Cloud Infrastructure Entitlement Management, such as those provided in Fortinet’s Lacework FortiCNAPP Cloud Native Application Protection Platforms (CNAPP) solution. While traditional stand-alone CSPM tools can identify misconfigurations, such as exposed storage buckets, they lack the ability to actively protect or provide the full visibility and context to amplify weak signals to identify complex threats that may exist within the cloud environment.

Increasing investment in cloud security

On average, cloud security currently accounts for 35% of overall IT security spending, reflecting the growing importance of protecting hybrid and multi-cloud environments, but with cloud security now a top priority for organisations, 63% plan to increase their budgets in the next 12 months.

Organisations should evaluate their approaches to cloud security investments, particularly those with ‘cloud minimum spend’ commitment obligations. They should consider flexible daily-usage licencing programmes that offer a broad catalogue of solutions, empowering them to readily deploy what they need, quickly scale up, down, in, or out as required, and only pay for actual usage. Additionally, an ideal programme should readily allow you to draw down your cloud spend commitment obligations at the same time.

Building a resilient cloud security posture

The report underscores the growing complexity of today’s hybrid and multi-cloud environments, and the urgent need for proactive strategies to address their evolving challenges. Critical steps include: 

• Adopting unified platforms to simplify policy management and ensure consistency across environments. 

• Investing in training to bridge the cybersecurity skills gap. 

• Leveraging a cloud-native application protection platform that combines advanced tools like workload protection, configuration management, runtime defence to secure containers, and integrated solutions to enhance threat detection and remediate issues. 

• Using end-to-end encryption and automated risk remediation to improve data protection.  

In addition, emerging trends—like the integration of AI-driven threat detection, the rise of edge computing, and the increasing emphasis on zero-trust architectures—are set to shape the next wave of cloud security solutions.

Download the report at www.fortinet.com/resources/reports/cloud-security




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.