Cloud
We've curated 219 cybersecurity statistics about Cloud to help you understand how threats like data breaches and misconfigurations are affecting cloud environments in 2025, along with best practices for securing your digital assets in the cloud.
Related Topics
Showing 61-80 of 219 results
In one analysis, energy had 18% of vulnerable assets across cloud, APIs, and web applications.
13.6% of all analyzed cloud assets are vulnerable.
In one analysis, telecommunications had 15% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, retail had 27% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, technology had 15% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, construction had 18% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, health care & insurance had 16% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, technology had 15% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, government had 26% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, retail had 27% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, health care & insurance had 16% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, retail had 23.3% vulnerable cloud assets.
In one analysis, government had 26% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, telecommunications had 15% of vulnerable assets across cloud, APIs, and web applications.
In one analysis, education had 31% of vulnerable assets across cloud, APIs, and web applications.
68% of respondents reported a rise in access-based attacks.
57% of organisations use five or more encryption key managers.
17% of respondents identified cloud security as their number one priority.
The average number of public cloud providers per organisation has risen to 2.1.
Enterprises now use an average of 85 SaaS applications, contributing to security tool sprawl.