1、Table of Contents Introduction 3 Key Findings 4 Top-Ranked Enterprise Security Priorities 6 The Impact Of Cloud Complexity On Shaping Security Demands 7 The Rise Of Cloud Resources As The Biggest Targets Of Attack 9 Implications Of Human Factors In Cloud Security 11 How Organizations Are Investing I
2、n Securing Cloud Assets And How Standing Still Means Falling Behind 13 The Need To Future-Proof Investments In Areas Such As Digital Sovereignty 14 The DevOps Experience 18 Pathways To Better Cloud Utilization 19 About This Study 202Sponsored byIntroductionSource:2024 Data Threat Report custom surve
3、y from S&P Global Market Intelligence,commissioned by Thales.The 2024 Thales Cloud Security Study is in its fourth consecutive year of research.This years study revisits the latest trends affecting cloud security.With 3,000 respondents from 18 countries across 37 industries,the report reflects the i
4、nsights of individual contributors and managerial and executive levels within enterprises ranging from$100M USD to+2B USD in annual revenue/turnover.Along with its sister report,the Thales Global Data Threat Report,this 2024 Thales Cloud Security Study looks into aspects of cloud security and revisi
5、ts the impact of a dynamically expanding and complex attack surface.Unprecedented demand for compute and a growing volume of data challenge priorities for achieving better,more secure cloud adoption.Fittingly,despite cloud workloads becoming increasingly short-lived,cloud computing has become a more
6、 permanent technology for enterprises.While workloads and new architectures in the cloud are increasingly modular and dynamic,the evolving demands they bring for operations and security are constant and increasing.344%47%33%Key FindingsHuman action can compromise securitySecuring sensitive cloud dat