Proactive Cloud Workload Security StrategyΒ
The leap towards cloud computing has fast-forwarded digital transformation for countless organizations. What there hasnβt been, however, is a corresponding improvement in the ability of organizations to secure the cloud, especially as cloud service providers rapidly integrate GenAI.
Stealthy Attack Techniques Are Targeting Cloud Providers
Cloud security risks are evolving rapidly as attackers adopt more sophisticatedβand evasiveβtactics to target cloud workloads.
The 2025 Verizon DBIR highlights a significant rise in the exploitation of stolen credentials and exposed API secrets, which now account for over one in five breaches. Attackers are increasingly leveraging infostealer malware to compromise unmanaged or personal devices that host corporate credentials, making it easier to infiltrate enterprise cloud environments without triggering traditional security alerts.
Even more concerning, secrets like access tokens and cloud API keys are frequently found in public code repositories, with remediation delays averaging 94 daysβgiving threat actors ample time to exploit them.
Advanced adversaries are also exploiting zero-day vulnerabilities in edge devices and VPNsβcritical gateways to cloud infrastructure. The report notes an eightfold increase in these types of attacks year over year, with 22% of exploitation activity targeting perimeter devices that interface directly with the internet.
These attacks are often paired with credential stuffing or token abuse, enabling lateral movement into cloud systems where traditional detection tools struggle. In parallel, third-party platforms like Snowflake and MOVEit have become high-value targets due to poor MFA enforcement or security misconfigurations, turning software supply chains into a rich hunting ground for cybercriminals and state-sponsored actors alike.
All together, these trends underscore how cloud workloads are being hit by multi-stage, stealthy campaigns that bypass signature-based tools and exploit structural weaknesses in identity, access, and software supply chain security.
Defenders must move beyond reactive detection and invest in preventative controls that assume compromiseβfrom stronger secrets management and zero-trust enforcement to deception-based, preventative defenses that expose attackers early in the kill chain.
AI Adoption is Driving Innovation in Cloud Security
According to Gartnerβs Emerging Tech Impact Radar: Cloud Security report, the cloud security landscape is undergoing a transformational shift driven by AI adoption, software supply chain risks, and the maturation of cloud-native technologies.
As businesses accelerate their use of cloud-based infrastructure and GenAI capabilities, security product leaders must evolve just as quickly. Emerging cloud security technologiesβincluding eBPF-based runtime defenses, CNAPPs (cloud-native application protection platforms), and automated response frameworksβare at the forefront of this evolution, enabling more dynamic and real-time threat mitigation. However, while operational capabilities improve, Gartner warns that by 2028, over 40% of GenAI implementations will still be built on ecosystems with poor AI readiness, requiring runtime defenses to bridge the gap between innovation and secure execution.
The convergence of AI, ML, and cloud-native development introduces both opportunities and risks. By 2029, 60% of new enterprise applications will embed AI/ML models via cloud AI developer servicesβyet many will lack adequate security and responsible AI governance. This shortfall increases exposure to misconfigurations, model poisoning, and unvetted third-party dependencies. To stay ahead, organizations must not only adopt improved observability and incident response mechanisms but also embrace preventative security models designed for the scale and speed of modern cloud environments.
One of the most promising advancements highlighted by Gartner is Automated Moving Target Defense (AMTD) for workloads. AMTD shifts cloud workload protection from reactive detection to proactive disruption by continuously randomizing configurations, network policies, and application behavior. By integrating deception technologies and decoys, AMTD confuses and misleads attackers, significantly increasing the cost and complexity of exploitation attempts.
As cloud workloads become increasingly distributed and adversaries more sophisticated, AMTD for workloads represents a powerful evolutionβreducing dwell time, neutralizing unknown threats, and shrinking the attack surface.
Gartner predicts that βby 2030, a quarter of all cloud-native environments will adopt preventative technologies like AMTD, propelled by advances in automation and AI maturity.β Security leaders who embrace these innovations today will be best positioned to defend tomorrowβs cloud.
Preemptive Cyber Defense: Securing Cloud Workloads at the Speed of Innovation
With sophisticated adversaries bypassing detection-based defenses through memory-resident attacks, credential theft, and zero-day exploits that target cloud-native infrastructure, organizations need a fundamentally different approachβone that prevents threats before they can execute, rather than reacting after the fact.
A preemptive cyber defense strategy, supported by AMTD, delivers exactly that. Morphisecβs pioneering AMTD technology introduces continuous, automated changes at runtime to cloud workloadsβrandomizing memory structures, application surfaces, and system behavior to confuse and derail attackers. This dynamic, unpredictable environment makes it nearly impossible for adversaries to gain a foothold, regardless of whether theyβre using known, unknown, or zero-day techniques.
By integrating AMTD as a foundational layer in cloud security architectures, organizations can confidently pursue innovation without expanding their attack surface. Developers can move fast, embrace new cloud-native services, and build with AIβknowing their workloads are protected by a security strategy thatβs built to prevent the threats of tomorrow, not just detect the threats of today.
As Gartner forecasts broader adoption of preventative technologies like AMTD by 2030, companies that embrace preemptive cyber defense now will be better equipped to protect their cloud investments and outpace even the most advanced adversaries.
Learn how Morphisec can help β download the Achieving Cyber Resiliency white paper for more adaptive and proactive strategies to counter advancing attacks.
Stay up-to-date
Get the latest resources, news, and threat research delivered to your inbox.