September 23, 2023

Volume XIII, Number 266


September 22, 2023

Subscribe to Latest Legal News and Analysis

September 21, 2023

Subscribe to Latest Legal News and Analysis

Cloud Security Survey: 2016 Results

In the second annual Cloud Security Survey, CloudPassage surveyed the more than 300,000 members of LinkedIn’s Information Security Community on the state of cloud security. As companies continue to invest in the cloud to reduce IT costs and increase flexibility and scalability, privacy and security of data remain top concerns.

Among the key findings include the following:

  • Security concerns are the number one barrier to cloud adoption. General security concerns (53%) top the list, followed by legal and regulatory compliance concerns (42%—up from 29% in last year’s survey) and data loss and leakage risks (40%).

  • The top types of data stored in the cloud are email (44%), customer data (31%), sales and marketing data (31%), and employee and payroll data (30%).

  • The specific threats to public cloud security that the survey highlights include (i) unauthorized access through misuse of employee credentials and improper access controls (53%), (ii) hijacked accounts (44%), and (iii) insecure interfaces/APIs (39%).

  • The vast majority (84%) of respondents are dissatisfied with traditional security tools when applied to cloud infrastructure, because they are somewhat ineffective (48%), completely ineffective (11%), or can’t be measured for effectiveness (25%) in cloud environments.

  • To strengthen cloud security, 61% of organizations plan to train and certify existing IT staff, 45% plan to partner with a managed security services provider, and 42% plan to deploy additional security software to protect data and applications in the cloud.

The rise in specific concerns about compliance and integration suggests that companies are moving from theoretical exploration of cloud models to actual implementation. These results also suggest that companies are further along in implementation of cloud models compared with last year and are looking for security solutions that enhance the capabilities that service providers offer.

Copyright © 2023 by Morgan, Lewis & Bockius LLP. All Rights Reserved.National Law Review, Volume VI, Number 260

About this Author

Peter Watt-Morse, Morgan Lewis, Intellectual property lawyer

Peter M. Watt-Morse, one of the founding partners of the firm’s Pittsburgh office, has worked on all forms of commercial and technology transactions for more than 30 years. Peter works on business and intellectual property (IP) matters for a broad range of clients, including software, hardware, networking, and other technology clients, pharmaceutical companies, healthcare providers and payors, and other clients in the life science industry. He also represents banks, investment advisers, and other financial services institutions.

Cindy L. Dole, Morgan Lewis, Technology IP Lawyer, Finance matters Attorney

Cindy L. Dole collaborates with clients at the intersection of technology, intellectual property (IP), and finance. In her technology-based transactional practice, she advises on matters including corporate partnering, open source software strategy, distribution and sales arrangements, cloud computing, and other electronic commerce (e-commerce). Additionally, Cindy helps companies develop and implement IP strategy in connection with financings, mergers, acquisitions, and initial public offerings (IPOs).