SHARE
Facebook X Pinterest WhatsApp

State of Cyber Assets Report Still Finds Vulnerabilities

thumbnail
State of Cyber Assets Report Still Finds Vulnerabilities

Antivirus interface over modern tech devices in dark background 3D rendering

Cloud-native security tools could provide the type of support teams need to stay on top of security threats, respond faster, and monitor more efficiently.

May 9, 2022

A new report (The 2022 State of Cyber Assets Report 2022 SCAR) showcases findings from analyzing more than 370 million assets at 1300 organizations. A vast majority of challenges will come from cloud assets, a worrying trend as more companies move entirely to the cloud.

[Download Now] State of the Cloud: A Security Perspective

The ever-expanding attack surface is the result of digital transformation initiatives. While many enterprises have needed this change, it does bring new challenges to the IT department. The survey found that traditional approaches don’t provide enough security for this level of an asset, underscoring how critical it is for security-first approaches as digital and cloud transformation continue.

See also: Five Biggest Cybersecurity Trends in 2022

The cloud is vast, and security teams are overwhelmed

Cloud solutions have become the primary mode of operation for companies of all sizes, leaving security teams scrambling to put out fires and maintain observability. According to the survey, 90 percent of all company assets exist in the cloud, creating a massive repository—around 165,000 assets on average—for teams to manage.

Skills gaps and a competitive hiring climate compound these challenges. Organizations must find innovative ways to support existing cybersecurity teams without relying on hiring new team members. Tools that ensure teams become more efficient will offer the most significant impact.

See also: Continuous Intelligence Insights

Advertisement

Relationships between assets could also provide key data to prevent attacks

Existing cybersecurity models don’t pay much attention to the relationships between users, devices, and networks. An under-resourced cybersecurity team is less able to identify relationships between these components and potential vulnerabilities. However, cloud-native security tools could provide the type of support teams need to stay on top of security threats, respond faster, and monitor more efficiently.

[Download Now] State of the Cloud: A Security Perspective
EW

Elizabeth Wallace is a Nashville-based freelance writer with a soft spot for data science and AI and a background in linguistics. She spent 13 years teaching language in higher ed and now helps startups and other organizations explain - clearly - what it is they do.

Recommended for you...

Top 5 Smart Manufacturing Articles of 2025
Building Resilient and Sustainable Industries With AI, IoT, Software-Defined Systems, and Digital Twins
Peter Weckesser
Nov 26, 2025
Adaptive Edge Intelligence: Real-Time Insights Where Data Is Born
Skype May Be Gone, but P2P Is Here To Stay

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.