As cloud adoption accelerates, so do the challenges of securing digital environments. In 2025, staying ahead means embracing new technologies, addressing emerging threats and aligning strategies with evolving regulations.
Four of our experts share their insights on the key trends, risks and best practices shaping cloud security for you to keep an eye on in the coming year.
SASE & CNAPP: the expansion continues
Insights from Gabriela Gorzycka: Secure access service edge (SASE) and cloud-native application protection platform (CNAPP) are not newcomers in 2025. However, this year they continue to grow, mature and diversify with new features.
This expansion is particularly evident within complex, multi-cloud environments, though it is seldom unleashed in a grand, big-bang manner.
Many began with cloud security posture management (CSPM) as the first step, while others had existing network security measures that could serve as a foundation for expansion. Additionally, some companies have effectively secured their on-premises environments with well-known technologies like vulnerability management systems first and are now seeking to extend this to the cloud.
Contrary to previous assumptions, SASE and CNAPP are not yet standard but these are approaching widespread adoption. The SASE market is projected to reach $12.94 billion in 2025, growing to $32.60 billion by 2030 at a CAGR of 20.29%. Similarly, the CNAPP market is expected to grow from $10.74 billion in 2025 to $59.88 billion by 2034.
As adoption increases, every major vendor is either developing or has developed their CNAPP and/or SASE, signaling a forthcoming technology competition. They will differentiate on various factors including ease of configuration, capabilities to cover all products expected within the SASE or CNAPP suite, quality in detecting threats or vulnerabilities, ease of use and pricing.
The eventual winner of this competition is yet to be determined, but the race is sure to be captivating. It will involve not only hyperscalers and leading security vendors with substantial R&D budgets, but also startups with potentially shorter time-to-market and a better understanding of customer needs. I will be monitoring this competition closely, as it promises to yield innovative products in the coming years!
AI and GenAI in cloud security implications
Insights from George Gardon and Raul Sălăgean: AI and Generative AI (GenAI) are transforming cloud security by automating complex workflows and enhancing cybersecurity efficiency. In 2025, the focus will shift to using AI-driven platforms to prioritize security alerts, enabling faster responses to critical threats while reducing false positives. This next phase emphasizes collaboration between humans and AI, maintaining supervision and scalability.
Gartner predicts that by 2028, GenAI could eliminate the need for specialized education in half of entry-level cybersecurity roles, bridging the skills gap.
Insights from Raul Sălăgean: Rapid advancements in AI could still make the 2028 prediction achievable, driving efficiency and expanding access to cybersecurity expertise. Enterprises leveraging GenAI with integrated security platforms could see a 40% reduction in employee-driven incidents by 2026, emphasizing its potential to improve security posture.
As organizations continue adopting cloud services, ensuring equitable access to AI tools across teams will be critical for safeguarding digital ecosystems and preparing the workforce for an AI-driven future.
Managing cloud misconfigurations and risks
Insights from Ljubo Brodaric: As cloud adoption continues to grow, so does the complexity of managing these environments securely. In 2019, Gartner predicted that through 2025, 99% of cloud security failures would be the customer’s fault. Will this prediction come true this year? And if so, how do we address this pressing issue?
As these cloud setups grow more complex, the likelihood of misconfigurations rises. Organizations are leveraging multiple cloud services, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), often from various providers like AWS, Microsoft Azure, or Google Cloud.
In addition, cloud providers are constantly rolling out new features.
While these innovations bring new capabilities, they also add complexity. Staying on top of the latest updates and configuring them securely is no small task.
Another significant factor is the shortage of skilled professionals in cloud security. The rapid adoption of cloud technology has created a demand for expertise that outpaces the current supply. Many IT teams are still developing the necessary skills to manage and secure cloud environments, which increases the risk of configuration errors. The skills gap means that even well-intentioned teams may inadvertently leave their systems vulnerable.
Besides the focus on misconfiguration as a possible leading cause of cloud breaches, it is essential to consider other potential risks like cloud provider black swan incidents. These are rare, unpredictable events that can have severe consequences. For instance, vulnerabilities in the cloud provider’s infrastructure, large-scale cyber-attacks, or systemic failures within the provider’s services could result in significant breaches. Although infrequent, such incidents can cause substantial disruptions, but not entirely beyond the mitigation of individual organizations.
A significant area of concern is the issue with specialized providers focusing on specific markets or specific technologies. Smaller providers might not have the same level of security practices as major cloud providers, which then can lead to breaches that are not necessarily the result of customer misconfigurations but rather weaknesses within the provider’s offerings.
While misconfiguration is undoubtedly a significant driver of cloud breaches, organizations must also be aware of other risks like black swan events and vulnerabilities within specialized providers. By addressing both misconfigurations and broader vulnerabilities, organizations can protect their cloud environments better and reduce the probability of breaches.
Building your security posture in the NIS2 period
Insights from George Gardon and Raul Sălăgean: With the enforcement of the NIS2 Directive, cloud security in 2025 will emphasize proactive strategies to enhance resilience against increasingly sophisticated threats. NIS2 focuses on operational resilience, risk management, and cybersecurity, driving organizations to shift from reactive responses to continuous risk assessment and mitigation.
Sovereignty-focused security solutions, such as localized data storage, will maintain their importance to address regulatory needs. However, frameworks like NIS2 prioritize resilience, cross-border collaboration and harmonization over strict sovereignty mandates.
Companies will invest in predictive analytics to identify emerging threats and dynamically adjust security policies. Achieving a strong security posture in 2025 will require integrating advanced technologies with streamlined processes to safeguard data and build trust. While localized solutions may appear in specific sectors, the overarching focus will remain on harmonized frameworks and standardized compliance to strengthen cybersecurity and operational resilience.