Cloud
Cybersecurity statistics about cloud
Related Topics
Showing 61-80 of 219 results
In one analysis, manufacturing had 19% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, professional services had 28% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, construction had 18% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, education had 31% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, energy had 18% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, finance had 5% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, government had 26% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, health care & insurance had 16% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, hospitality had 15% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, manufacturing had 19% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, media had 21% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, professional services had 28% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, retail had 27% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, telecommunications had 15% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, transport had 12% of vulnerable assets across cloud, APIs, and web applications.
Nearly two-thirds (64%) of respondents ranked cloud security among their top five security priorities.
17% of respondents identified cloud security as their number one priority.
55% of respondents report cloud environments are more complex to secure than on-premises infrastructure. This represents a 4-percentage-point increase from last year.
57% of organisations use five or more encryption key managers.
Enterprises now use an average of 85 SaaS applications, contributing to security tool sprawl.