Spending more on security, encrypting less: the cloud data encryption gap nobody is talking about

CloudTech is part of the TechForge Publications seriesView AllAI NewsDeveloperIoT NewsMarketing TechTechHQTech Wire AsiaTelecomsView AllAI NewsDeveloperIoT NewsMarketing TechTechHQTech Wire AsiaTelecomsTechForge SearchNewsCategoriesCloud in ActionCloud MigrationCloud ROI & CostInternal Change ManagementMissteps & LessonsSME & Startup CloudEditorial DeskAnnouncements & AnalysisForecasts & TrendsMigrations: Behind the ScenesTechEx EventsFeaturesInterviewsPodcastsSponsored ContentVideosWebinarsFuture of CloudAI & CloudCloud EthicsEdge & Distributed CloudOpen CloudQuantum & CloudServerless ArchitectureSustainable CloudIndustry PerspectivesEducation & ResearchFinanceHealthcare & Life SciencesLegal & HRMedia, Gaming & CreativePublic SectorRetail & ConsumerMarket IntelligenceCloud StartupsEarnings & Market ShareEvent CoverageMergers & AcquisitionsVendor Roadmaps & LeadershipSecurity, Privacy & TrustCloud CybersecurityCyber Security & Cloud ExpoEncryption & Data PrivacyGovernance, Risk & ComplianceIdentity & AccessStrategy & Decision-MakingChoosing a Cloud StrategyFinOps & BudgetsLock-In & ExitMulti- & Hybrid CloudProcurement & ContractsSkills & HiringTechnology StackBig VendorsContainers & KubernetesDatabases & Data PlatformsInfrastructure as CodeObservability & MonitoringXaaS ModelsEventsResourcesOn-demand WebinarsExclusive VideosPodcastsAll ResourcesMoreAdvertiseAbout UsContact Us SearchNewsCategoriesCloud in ActionCloud MigrationCloud ROI & CostInternal Change ManagementMissteps & LessonsSME & Startup CloudEditorial DeskAnnouncements & AnalysisForecasts & TrendsMigrations: Behind the ScenesTechEx EventsFeaturesInterviewsPodcastsSponsored ContentVideosWebinarsFuture of CloudAI & CloudCloud EthicsEdge & Distributed CloudOpen CloudQuantum & CloudServerless ArchitectureSustainable CloudIndustry PerspectivesEducation & ResearchFinanceHealthcare & Life SciencesLegal & HRMedia, Gaming & CreativePublic SectorRetail & ConsumerMarket IntelligenceCloud StartupsEarnings & Market ShareEvent CoverageMergers & AcquisitionsVendor Roadmaps & LeadershipSecurity, Privacy & TrustCloud CybersecurityCyber Security & Cloud ExpoEncryption & Data PrivacyGovernance, Risk & ComplianceIdentity & AccessStrategy & Decision-MakingChoosing a Cloud StrategyFinOps & BudgetsLock-In & ExitMulti- & Hybrid CloudProcurement & ContractsSkills & HiringTechnology StackBig VendorsContainers & KubernetesDatabases & Data PlatformsInfrastructure as CodeObservability & MonitoringXaaS ModelsEventsResourcesOn-demand WebinarsExclusive VideosPodcastsAll ResourcesMoreAdvertiseAbout UsContact Us Subscribe Subscribe SearchNewsCategoriesCloud in ActionCloud MigrationCloud ROI & CostInternal Change ManagementMissteps & LessonsSME & Startup CloudEditorial DeskAnnouncements & AnalysisForecasts & TrendsMigrations: Behind the ScenesTechEx EventsFeaturesInterviewsPodcastsSponsored ContentVideosWebinarsFuture of CloudAI & CloudCloud EthicsEdge & Distributed CloudOpen CloudQuantum & CloudServerless ArchitectureSustainable CloudIndustry PerspectivesEducation & ResearchFinanceHealthcare & Life SciencesLegal & HRMedia, Gaming & CreativePublic SectorRetail & ConsumerMarket IntelligenceCloud StartupsEarnings & Market ShareEvent CoverageMergers & AcquisitionsVendor Roadmaps & LeadershipSecurity, Privacy & TrustCloud CybersecurityCyber Security & Cloud ExpoEncryption & Data PrivacyGovernance, Risk & ComplianceIdentity & AccessStrategy & Decision-MakingChoosing a Cloud StrategyFinOps & BudgetsLock-In & ExitMulti- & Hybrid CloudProcurement & ContractsSkills & HiringTechnology StackBig VendorsContainers & KubernetesDatabases & Data PlatformsInfrastructure as CodeObservability & MonitoringXaaS ModelsEventsResourcesOn-demand WebinarsExclusive VideosPodcastsAll ResourcesMoreAdvertiseAbout UsContact Us Hamburger Toggle Menu AI & Cloud, Cloud Computing, Encryption & Data Privacy, Security, Privacy & Trust, TechEx EventsSpending more on security, encrypting less: the cloud data encryption gap nobody is talking aboutDashveenjit Kaur6th April 2026 Share this story: Tags:AI securityCloud SecurityCybersecurity & Cloud ExpoData breachData encryptionIdentity and access managementTechEx North AmericaThalesCategories::AI & CloudCloud ComputingEncryption & Data PrivacySecurity, Privacy & TrustTechEx EventsCloud data encryption is supposed to be a solved problem.Organisations have been investing in data security for years, deploying platform after platform, and signing off on security budgets that continue to increase.And yet the 2026 Thales Data Threat Report, published last month and based on a survey of 3,120 IT and security professionals worldwide, finds that only 47% of sensitive data held in cloud environments is actually encrypted. That is down from 51% the previous year.

A four-point decline does not sound dramatic until you consider the direction it represents.Cloud adoption has not slowed.The volume of sensitive data being moved into cloud environments has not shrunk.

The number of AI systems accessing that data has grown considerably. And through all of it, encryption coverage has moved backwards.More tools, less clarityPart of what makes this finding uncomfortable is that it does not reflect a lack of effort or investment.The Thales report found that 77% of organisations are running five or more separate data protection tools.Nearly half are managing five or more key management systems simultaneously.That is not a picture of neglect.

It is a picture of fragmentation, and that comes with a cost.When protection is distributed across too many systems, with no single point of visibility into what is encrypted, where, and under whose policy, the gaps between tools become the attack surface. Misconfiguration was cited as the leading cause of cloud breaches in the report, at 28%.That figure becomes easier to understand once you see how many overlapping, poorly integrated systems most security teams are trying to maintain.

The Thales report is direct on this point: more tools do not mean better security. It often means more gaps with no one clearly accountable for closing them.AI is making the stakes higher, not lowerWhat shifts the urgency of the cloud data encryption gap is the pace at which AI systems are now accessing enterprise data.The Thales report found that 61% of organisations say their AI applications are already being targeted by attackers, with sensitive data as the primary focus.At the same time, AI tools and agents are increasingly being granted automated access to cloud-held data, often with fewer controls and less oversight than would be applied to human users.Sébastien Cano, Senior Vice President of Cyber Security Products at Thales, put it plainly in the report: “Insider risk is no longer just about people.

When identity governance, access policies, or encryption are weak, AI can amplify those weaknesses across environments far faster than any human ever could.”That last part matters.The problem with under-encrypted cloud data was always that a breach could expose it.The new dimension is that AI systems can process and propagate that data at a scale and speed that makes exposure far more consequential than it was previously.Credential theft has overtaken everything elseThe Thales report also documents a related shift in how attackers are getting in.

Credential theft was cited by 67% of organisations that experienced cloud attacks as the leading technique used against cloud management infrastructure.Identity and access management has now moved to the top of the security skills priority list for the first time, ahead of cloud security and application security.In an environment where AI agents operate on API keys, tokens, and machine credentials rather than human logins, compromising an identity is often the fastest route to sensitive data.And if that data is unencrypted when it is reached, the breach is complete.The quantum dimensionThere is a longer-horizon problem sitting behind the immediate one.

The Thales report found that 61% of organisations cite “harvest now, decrypt later” as their primary quantum-related concern, meaning adversaries are already collecting encrypted data today, intending to decrypt it once quantum computing makes that viable. The implication is that even data which is currently encrypted may not stay protected indefinitely if the cryptographic standards underpinning it are not updated.59% of respondents say they are already prototyping or evaluating post-quantum cryptographic algorithms, which leaves roughly four in ten organisations that have not begun that process.The window for orderly cryptographic migration is not open indefinitely.See also: Cloud demand shifts toward AI as enterprise use deepensWant to learn more about Cloud Computing from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London.The comprehensive event is part of TechEx and is co-located with other leading technology events, click here for more information.CloudTech News is powered by TechForge Media.

Explore other upcoming enterprise technology events and webinars here.About the Author Dashveenjit KaurJournalist Dashveenjit is an experienced tech and business journalist with a determination to find and produce stories for online and print daily.She is also an experienced parliament reporter with occasional pursuits in the lifestyle and art industries.Related The cloud security complexity gap just hit the European Commission, and the data suggests it was predictable.6th April 2026 Comparing Microsoft CSP partners in Boston: Which one is right for you?2nd April 2026 Cloud costs rise as AI moves into core business systems1st April 2026 Red Hat’s 2026 report exposes the cloud-native security execution gap–and how to close it1st April 2026 The cloud security complexity gap just hit the European Commission, and the data suggests it was predictable.6th April 2026 Comparing Microsoft CSP partners in Boston: Which one is right for you?2nd April 2026 Cloud costs rise as AI moves into core business systems1st April 2026 Red Hat’s 2026 report exposes the cloud-native security execution gap–and how to close it1st April 2026 Join our CommunitySubscribe now to get all our premium content and latest tech news delivered straight to your inbox Click here Popular Cloud ROI & Cost, Interviews, Sponsored Content, Sustainable CloudRipple effect: Xylem’s sustainable water solutions for Europe’s data centres 20451 view(s)Cloud Computing, XaaS ModelsConcern over cloud storage security remains says Spiceworks – but good news for OneDrive 12603 view(s)Big Vendors, Cloud Computing, Cloud Cybersecurity, Market Intelligence, Security, Privacy & Trust10 real-life cloud security failures and what we can learn from them 5956 view(s)Big Vendors, Cloud Computing, Market Intelligence5 of the best: cloud technology training platforms 5882 view(s)Cloud ROI & Cost, Interviews, Sponsored Content, Sustainable CloudRipple effect: Xylem’s sustainable water solutions for Europe’s data centres 20451 view(s)Cloud Computing, XaaS ModelsConcern over cloud storage security remains says Spiceworks – but good news for OneDrive 12603 view(s)Big Vendors, Cloud Computing, Cloud Cybersecurity, Market Intelligence, Security, Privacy & Trust10 real-life cloud security failures and what we can learn from them 5956 view(s)Big Vendors, Cloud Computing, Market Intelligence5 of the best: cloud technology training platforms 5882 view(s) See all Latest View All Latest AI & Cloud1st April 2026Cloud costs rise as AI moves into core business systems AI & Cloud1st April 2026Red Hat’s 2026 report exposes the cloud-native security execution gap–and how to close it Big Vendors31st March 2026Tata SD-WAN for DC connectivity in the AI age AI & Cloud1st April 2026Cloud costs rise as AI moves into core business systems AI & Cloud1st April 2026Red Hat’s 2026 report exposes the cloud-native security execution gap–and how to close it Big Vendors31st March 2026Tata SD-WAN for DC connectivity in the AI age SubscribeAll our premium content and latest tech news delivered straight to your inbox Subscribe ExploreAbout UsContact UsNewsletterPrivacy PolicyCookie PolicyAbout UsContact UsNewsletterPrivacy PolicyCookie PolicyReach Our AudienceAdvertisePost a Press ReleaseContact UsAdvertisePost a Press ReleaseContact UsCategoriesCloud in ActionEditorial DeskFeaturesFuture of CloudIndustry PerspectivesMarket IntelligenceSecurity, Privacy & TrustTechnology StackStrategy & Decision-MakingAll CategoriesCloud in ActionEditorial DeskFeaturesFuture of CloudIndustry PerspectivesMarket IntelligenceSecurity, Privacy & TrustTechnology StackStrategy & Decision-MakingAll CategoriesOther PublicationsExplore AllAI NewsDeveloperIoT NewsMarketing TechTechHQTech Wire AsiaTelecomsExplore AllAI NewsDeveloperIoT NewsMarketing TechTechHQTech Wire AsiaTelecomsCloudTech News is part of TechForge  SubscribeAll our premium content and latest tech news delivered straight to your inbox

Read More
Related Posts