Cloud Risk Management: Key Insights from 2025 Survey

A recent survey highlights the growing importance of hybrid cloud environments, but new vulnerabilities in management tools pose significant risks. Understanding these threats is crucial for safeguarding data.

Cloud SecurityMEDIUMUpdated: Published: ๐Ÿ“ฐ 3 sources

Original Reporting

TMTrend Micro Research

AI Summary

CyberPings AIยทReviewed by Rohit Rana

๐ŸŽฏThink of hybrid clouds as a house with two doors: one to the cloud and one to your on-premises servers. If either door is weak, intruders can sneak in from either side. It's important to check both doors regularly to keep your valuables safe.

What Happened

In today's digital landscape, cloud computing is essential for businesses. A recent survey by Trend Micro, the 2025 Defenders Survey, highlights the growing importance of hybrid and multi-cloud environments. These setups allow companies to use multiple cloud services simultaneously, enhancing flexibility and efficiency.

The survey reveals that organizations are increasingly adopting these cloud strategies to improve their IT resilience and business operations. As more companies transition to the cloud, understanding the risks involved becomes crucial. This survey sheds light on how businesses can effectively manage those risks while leveraging the benefits of cloud technology.

In addition, the Cloud Security Forecast 2026 from Qualys emphasizes that cloud risk is now predictable, settling into patterns driven primarily by identity and permissions. It highlights that misgoverned identities and access relationships are the root causes of most cloud security incidents, rather than traditional software vulnerabilities.

However, recent findings presented at the Black Hat Asia conference by researchers from Cymulate reveal that hybrid cloud management tools, such as Microsoft's Windows Admin Center (WAC), present a two-way attack surface that organizations may not be adequately monitoring. The researchers identified several vulnerabilities (CVE-2025-64669, CVE-2026-20965, CVE-2026-23660, and CVE-2026-32196) that allow attackers to exploit both on-premises and cloud environments through misconfigured settings in WAC. These vulnerabilities raise concerns about the security of hybrid cloud setups, as they could enable attackers to move laterally between environments.

Why Should You Care

You might wonder why this matters to you. If you use online services for banking, shopping, or even storing photos, youโ€™re part of the cloud ecosystem. Cloud risks can lead to data breaches, loss of sensitive information, and even financial loss. Imagine putting your valuables in a shared storage unit; if that unit isn't secure, you risk losing everything.

By understanding cloud risks, you can take steps to protect your personal and business data. This is especially important as cyber threats continue to evolve. The key takeaway is that being informed about cloud risk management can help you safeguard your valuable information, particularly in light of new vulnerabilities affecting hybrid cloud environments.

What's Being Done

Trend Micro and other cybersecurity companies are actively working to address cloud risks. They are developing tools and strategies to help organizations secure their data across multiple cloud environments. Here are a few actions you should consider:

  • Stay informed about the latest cloud security practices.
  • Regularly assess your cloud configurations and access controls.
  • Implement multi-factor authentication for added security.
  • Monitor hybrid cloud management tools for potential vulnerabilities.

Experts are closely monitoring how companies adapt to these risks and what new security measures will emerge. The landscape is constantly changing, and staying ahead is key to protecting your data in the cloud.

The Cloud Security Forecast 2026 indicates that organizations must shift their focus from merely identifying vulnerabilities to understanding how identities, permissions, and integrations create viable paths for compromise. With 49.4% of organizations still relying on manual remediation processes, the urgency to improve response speed is critical. As cloud environments evolve rapidly, ensuring that remediation keeps pace with changes is essential to mitigate exposure windows.

Key Insights from the 2026 Forecast

  1. Identity Architecture: The authority in cloud environments is determined by IAM policies and trust relationships. Mismanaged identities can lead to privilege escalation without exploiting vulnerabilities.
  2. Agentic AI: AI systems can now continuously analyze identities and permissions, revealing escalation paths that traditional methods might miss. This capability is crucial as organizations increasingly adopt AI workloads.
  3. Response Speed: The speed of response to changes in cloud environments is vital. Organizations must reduce the time between configuration changes and remediation to prevent attackers from exploiting newly created vulnerabilities.

With these insights, the focus on cloud risk management is shifting to a more integrated approach that emphasizes real-time correlation of signals and proactive control measures. The new vulnerabilities identified in hybrid cloud management tools underscore the need for organizations to treat all systems as critical and monitor them closely.

๐Ÿ”’ Pro Insight

As organizations increasingly rely on hybrid cloud setups, the recent vulnerabilities discovered in Microsoftโ€™s Windows Admin Center emphasize the need for comprehensive monitoring and risk management strategies.

๐Ÿ“… Story Timeline

Story broke by Trend Micro Research

Covered by Qualys Blog

Covered by The Register Security

Related Pings