{"id":13824,"date":"2026-04-16T13:47:57","date_gmt":"2026-04-16T13:47:57","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13824"},"modified":"2026-04-16T13:47:58","modified_gmt":"2026-04-16T13:47:58","slug":"cloud-workload-safety-thoughts-the-gaps","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13824","title":{"rendered":"Cloud workload safety: Thoughts the gaps"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">As IT infrastructure expands, visibility and management typically lag behind \u2013 till an incident forces a reckoning<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/tomas-foltyn\/\" title=\"Tom\u00e1\u0161 Folt\u00fdn\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2017\/11\/photo-BW.jpg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2017\/11\/photo-BW.jpg\" alt=\"Tom\u00e1\u0161 Folt\u00fdn\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>24 Mar 2026<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>4 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2026\/03-26\/cloud-workloads-1.png\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2026\/03-26\/cloud-workloads-1.png\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2026\/03-26\/cloud-workloads-1.png\" alt=\"Cloud workload security: Mind the gaps\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>Complexity is alleged to be the enemy of many issues, however in the case of organizations and their IT methods and processes, complexity is arguably the\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.schneier.com\/academic\/archives\/2025\/03\/complexity-is-the-worst-enemy-of-security.html\" target=\"_blank\" rel=\"noopener\">worst enemy of cybersecurity<\/a>. For a lot of IT and safety practitioners, this performs out every day as they scramble to handle what IBM as soon as referred to as a &#8220;<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/newsroom.ibm.com\/2022-09-28-Global-Business-Leaders-Say-Hybrid-Cloud-is-Critical-to-Modernization,-Yet-Security,-Skills-and-Compliance-Concerns-Impede-Success\">Frankencloud<\/a>,&#8221; a patchwork of personal and public cloud environments, typically additional entangled with numerous on-premise and presumably legacy assets.<\/p>\n<p>The convenience with which some cloud belongings, notably <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/virtual-machines-virtually-everywhere-real-security-gaps\/\" target=\"_blank\" rel=\"noopener\">digital machines<\/a>, could be spun up contrasts sharply with the fact of protecting them hardened and monitored as soon as they start to multiply. The machine and software program sprawl typically produces environments which can be heterogenous and beset by inconsistent guidelines, which in the end makes them troublesome to defend.<\/p>\n<h2>When it rains, it pours<\/h2>\n<p>IT and safety groups \u2013 which regularly quantity only a handful of individuals already stretched skinny by an industry-wide expertise scarcity \u2013 discover themselves leaping between dashboards and consoles as they attempt to sew collectively a coherent story from scattered knowledge factors. Each time an admin switches instruments or interfaces, the chance of a missed alert or one other misstep will increase, a lot to an attacker\u2019s delight.<\/p>\n<p>Dangerous actors, in spite of everything, don\u2019t consider organizations as collections of separate silos. They see one massive and more and more interconnected goal, the place a single account or machine \u2013 as soon as it\u2019s compromised by leaked credentials or one other gaffe \u2013 can be utilized for lateral actions or as an on-ramp for additional intrusions throughout environments.<\/p>\n<p>Danger typically thrives on the \u2018seams\u2019 of the infrastructure: the locations the place one entity\u2019s duty ends and one other\u2019s begins, or the place the traces are misunderstood \u2013 till the primary critical incident forces a reckoning. In fast-growing firms, that boundary is much too typically found the arduous approach. Many cloud knowledge breaches hint again to mundane lapses in safety hygiene and oversights within the administration of complicated deployments, somewhat than fiendish zero-day exploits.<\/p>\n<blockquote>\n<p>In line with Google\u2019s\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/services.google.com\/fh\/files\/misc\/cloud_threat_horizons_report_h22025.pdf\">H2 2025 Cloud Risk Horizons Report<\/a>, credential compromise and misconfiguration remained the first entry factors for menace actors into cloud environments within the first half of 2025. The latter half of final yr noticed an attention-grabbing twist, in response to the report\u2019s\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/services.google.com\/fh\/files\/misc\/cloud_threat_horizons_report_h12026.pdf\">H1 2026 concern<\/a>\u00a0revealed simply days in the past, as each preliminary entry vectors have been leapfrogged by software-based exploits.<\/p>\n<p>In the meantime, the value tag of the incidents stays steep. IBM\u2019s\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.ibm.com\/reports\/data-breach\">Value of a Information Breach 2025<\/a>\u00a0places the common price of an information breach that entails a number of environments at a mean of US$5.05 million, whereas the common price of an information breach involving \u201csolely\u201d the general public cloud isn\u2019t far behind at US$4.68 million. Authorized and compliance prices and a lack of fame and buyer belief then add insult to harm.<\/p>\n<\/blockquote>\n<p>If complexity is the enemy, then simplicity needs to be the antidote, proper? Not so reality. Few organizations can afford to surrender the flexibleness and cost-efficiency that made the cloud in numerous of its flavors enticing within the first place. Nor ought to they. The extra sensible ambition is to make complexity legible and manageable \u2013 and this begins with visibility. Worryingly, a\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2024\/02\/14\/cloud-security-alliance-survey-finds-77-of-respondents-feel-unprepared-to-deal-with-security-threats\">survey by the Cloud Safety Alliance<\/a>\u00a0has discovered that solely 23% of organizations have full visibility into their cloud environments.<\/p>\n<h2>Now you see me<\/h2>\n<p>Typically it&#8217;s important to say issues that go with out saying: you may\u2019t safe what you may\u2019t see. However \u2018uncooked\u2019 visibility by itself isn\u2019t sufficient. With out context and correlation that assist produce a full image, what you get is little greater than better-lit chaos. You want a approach to impose a unified coverage throughout environments after which to implement the principles throughout numerous methods, together with on digital machines in a number of clouds, and throughout identification layers. Arguably, this sort of unity doesn\u2019t make the atmosphere smaller, but it surely makes it manageable whereas decreasing the assault floor.<\/p>\n<p>When each authentication try, course of begin, community connection and file modification go away a hint someplace, the quantity of telemetry knowledge could be overwhelming. Subsequently, automation, when utilized rigorously, issues simply as a lot. It helps shut the gaps the place attackers prefer to dwell, countering the \u2018entropy\u2019 that naturally units in as networks develop. As well as, routine duties and correlation of telemetry knowledge from disparate sources are dealt with by a system that doesn\u2019t get drained or distracted. That approach, human operators can give attention to the components of incident response that require human judgment.<\/p>\n<p>The cloud itself shouldn&#8217;t be the issue, in fact. In methods which can be designed to scale and alter, a level of complexity is inevitable, particularly because the enterprise expands. Securing cloud workloads rests on making certain that as your digital infrastructure grows, your visibility and management develop with it. That approach, you keep away from studying the really arduous classes from incidents.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/us\/business\/solutions\/cloud-workload-protection\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/03-26\/cloud-workload-protection.png\" alt=\"cloud-workload-protection\" width=\"\" height=\"\"\/><\/a>\u00a0<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>As IT infrastructure expands, visibility and management typically lag behind \u2013 till an incident forces a reckoning 24 Mar 2026 \u00a0\u2022\u00a0 , 4 min. learn Complexity is alleged to be the enemy of many issues, however in the case of organizations and their IT methods and processes, complexity is arguably the\u00a0worst enemy of cybersecurity. For [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13826,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[234,4909,7752,211,8685],"class_list":["post-13824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cloud","tag-gaps","tag-mind","tag-security","tag-workload"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13824"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13824\/revisions"}],"predecessor-version":[{"id":13825,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13824\/revisions\/13825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13826"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-16 21:08:41 UTC -->