The cloud’s real security crisis in Australia

Illumio

By Andrew Kay, Director of Systems Engineering APJ, Illumio
Tuesday, 14 October, 2025


The cloud’s real security crisis in Australia

The cloud was meant to make everything easier. For years, Australian organisations have invested heavily in cloud platforms, attracted by the promise of agility, scalability and efficiency. The pitch was straightforward: instead of maintaining costly infrastructure, shift to the cloud and focus on what matters most — your customers, your products, and your growth.

But the reality of today’s cloud environment tells a different story. Rather than simplifying security, the cloud and the hybrid mesh (combining clouds and data centres into a giant, complex environment) have become the greatest source of security blindness in IT history. These environments aren’t static. They shift and morph thousands of times each day, as workloads spin up and down, connections change, and applications evolve. And yet, the visibility security teams have into what’s really happening inside these dynamic systems is little more than a snapshot. For many, that snapshot is already weeks or months out of date.

This is the cloud’s real crisis: the scale and speed of change far outstrip our ability to see, understand and defend it.

The hidden dangers of blind spots

The lack of visibility isn’t just inconvenient; it’s dangerous. Attackers thrive in the dark, and blind spots are their greatest advantage. Once inside, they can explore quietly, moving laterally between systems and applications, hiding in the shadows created by complexity.

Australian organisations are well aware of this problem. In fact, new research from Illumio reveals that 92% expect their cloud security budgets to increase in the next year, with almost one-third planning significant increases. Leaders are clear: the risks are growing, and more investment is required. But here’s the catch: despite higher spending, defenders still struggle to gain a coherent view of their sprawling cloud and hybrid environments.

This disconnect between rising investment and stagnant visibility is the heart of the crisis. More money doesn’t automatically translate into more security.

Why visibility matters more than ever

Every breach, no matter how it begins, follows a predictable playbook. Attackers gain access, they spread laterally, and they exploit blind spots to stay undetected. It’s not that organisations lack data. On the contrary, most enterprises are drowning in logs, feeds, and dashboards. The problem is that this data rarely translates into meaningful, real-time insight.

It’s like trying to navigate a city with only last year’s map. The streets have changed, new roads have opened, others have closed, and yet you’re still driving with outdated information. Attackers, meanwhile, are using a live GPS system. It’s hardly a fair fight.

The case for the security graph

This is why defenders need a fundamentally new approach; one that matches the way attackers already operate. Hackers don’t see systems as isolated servers or applications. They think in terms of graphs: nodes, connections, relationships and pathways. They chart how one compromised system can lead to another, creating a web of possibilities to exploit.

Defenders, by contrast, have been stuck with static lists and endless streams of alerts. That mismatch is why attackers continue to succeed.

The future lies in adopting an AI-powered security graph, which is a living, real-time map of your environment. A security graph shows how systems are connected, which applications are talking to each other, and where potential risks are lurking. Unlike traditional tools, it doesn’t generate more noise. Instead, it brings clarity by highlighting what matters most.

The power of the security graph is in context. It reveals the pathways attackers are most likely to use and gives defenders the ability to act decisively, shutting down lateral movement before a breach becomes catastrophic. In essence, it shifts the advantage back to defenders.

Confidence isn’t enough

Interestingly, many of Australia’s cloud security leaders say they feel prepared. Illumio research shows 93% believe they can detect and contain cloud-based threats. Confidence is important, but confidence alone is not a defence strategy.

Attackers are constantly evolving. They move fast, and they know how to exploit the weakest links in complex environments. Without real-time visibility, without a security graph that reflects the true state of the environment, confidence can quickly turn into complacency.

Seeing to survive

The lesson is simple: you can’t defend what you can’t see. Blindness in the cloud is the greatest security challenge of our time, and throwing more money at outdated approaches won’t solve it. What will make the difference is the shift to tools and mindsets that prioritise visibility, context and speed.

The organisations that embrace the AI-powered security graph will be the ones resilient enough to thrive in the post-breach era. They’ll be able to see attacks as they happen, contain them before they spread, and ensure that a breach doesn’t become a business-ending event.

In Australia, digital transformation is moving faster than ever, and the cloud now powers nearly every critical service we rely on. Resilience is essential. It’s what builds trust, keeps services running, and underpins long-term growth.

The cloud promised to make security simpler. Now it’s time to deliver on that promise, not by hoping attackers stay out, but by ensuring that when they get in, they have nowhere to hide.

Image credit: iStock.com/sankai

Related Articles

Cybersecurity KPIs still reactive rather than forward-looking: report

According to Tenable, the C-suite's rush to AI blinds leadership to critical security...

AI-first telcos: agentic AI enables connectivity providers to perform intelligently

As connectivity becomes the backbone of economies and societies, telcos have both an opportunity...

AI is driving the case for a fresh look at data sovereignty in Australia

In Australia, artificial intelligence has emerged as one of the strongest drivers for the...


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd