INNOVATIVE APPROACHES TO IMPROVING THE LEVEL OF CYBERSECURITY OF CORPORATE NETWORKS USING CLOUD TECHNOLOGIES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.934

Keywords:

cybersecurity, corporate networks, Cloud Technologies, Zero Trust, artificial intelligence, DevSecOps, cyber threats

Abstract

Modern methods and approaches to enhancing the level of cybersecurity in corporate networks in the context of cloud technology usage have been examined. The threats associated with cloud computing are analyzed, and effective innovative protection models are proposed, including Zero Trust Architecture, AI-based threat detection approaches, blockchain integration, container security, and encryption with key management policies. These ensure a multi-layered and adaptive security system capable of promptly responding to evolving threat types and minimizing potential risks of data leakage or compromise. The application of these approaches enables the creation of a resilient environment in which corporate information remains protected even under increasing complexity and intensity of cyberattacks. Emphasis is also placed on the importance of an integrated security approach that combines technical, organizational, and administrative measures. In today’s environment of rapid IT development and growing business dependence on cloud infrastructure, it is crucial not only to implement innovative protection tools but also to ensure their integration into a unified security management system. This system should cover all levels of the corporate network—from edge devices to cloud platforms—including access policies, encryption, authentication, user behavior monitoring, and real-time incident analytics. The comprehensiveness and coherence of such solutions not only increase the level of technical protection but also promote the development of a cybersecurity culture within the organization, where every element of the infrastructure is viewed both as a potential target and as an active participant in the defensive perimeter. The following sections will examine the main threats inherent in cloud environments and provide a detailed analysis of innovative approaches to their detection and mitigation.

Downloads

Download data is not yet available.

References

• Zhurakovskyi, B., Averichev, I., & Shakhmatov, I. (2023, November 21). Using the latest methods of cluster analysis to identify similar profiles in leading social networks. Information Technology and Implementation (Satellite) Conference Proceedings. https://ceur-ws.org/Vol-3646/Paper_12.pdf

• Ponochovny, P. (2024). Low-speed HTTP DDoS attack prevention model for end users. Cybersecurity: Education, Science, Technique, 2(26), 291–304. https://doi.org/10.28925/2663-4023.2024.26.695

• Hasan, M. (2024). Enhancing enterprise security with Zero Trust architecture. arXiv Preprint, arXiv:2410.18291. https://arxiv.org/abs/2410.18291

• Ahmed, S., Shihab, I. F., & Khokhar, A. (2025). Quantum-driven Zero Trust framework with dynamic anomaly detection in 7G technology: A neural network approach. arXiv Preprint, arXiv:2502.07779. https://arxiv.org/abs/2502.07779

• Ghasemshirazi, S., Shirvani, G., & Alipour, M. A. (2023). Zero Trust: Applications, challenges, and opportunities. arXiv Preprint, arXiv:2309.03582. https://arxiv.org/abs/2309.03582

• Rahmati, M. (2025). Federated learning-driven cybersecurity framework for IoT networks with privacy-preserving and real-time threat detection capabilities. arXiv Preprint, arXiv:2502.10599. https://arxiv.org/abs/2502.10599

• Cloud Security Alliance. (2025). Top threats to cloud computing 2025. https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-2025

• Softprom. (2025). The future of cloud security: 7 key trends in 2025. https://softprom.com/the-future-of-cloud-security-7-key-trends-in-2025

• Check Point Software Technologies Ltd. (2025). Top cloud security trends in 2025. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-code-security/top-cloud-security-trends-in-2025/

• MarketsandMarkets. (2024). The evolving synergy of cybersecurity and cloud computing: Trends, opportunities, and challenges. https://www.marketsandmarkets.com/blog/ICT/The-Evolving-Synergy-Of-Cybersecurity-And-Cloud-Computing

• Xsoft-Tech. (2025). Cloud security trends for 2025: Advanced strategies & solutions. https://xsoft-tech.com/blog/top-cloud-security-strategies-solutions

• IT Strategy News. (2025). New cybersecurity technologies in 2025: Innovations, trends, and insights. https://itstrategynews.com/new-cybersecurity-technologies-in-2025-innovations-trends-and-insights/

• National Cybersecurity Center of Excellence (NCCoE). (n.d.). Implementing a Zero Trust architecture. https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture

• CrowdStrike. (2025). What is Zero Trust? – Guide to Zero Trust security. https://www.crowdstrike.com/en-us/cybersecurity-101/zero-trust-security/

• General Services Administration (GSA). (2025). Zero Trust architecture. https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/it-security/zero-trust-architecture

• Check Point Software Technologies Ltd. (2024). Top 6 cloud security trends in 2024. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/top-6-cloud-security-trends-in-2024/

• Thales Group. (2024). 2024 cloud security study – Global edition. https://cpl.thalesgroup.com/cloud-security-research

• Palo Alto Networks. (2024). 2024 state of cloud native security report. https://www.paloaltonetworks.com/resources/research/state-of-cloud-native-security-2024

• Fortinet. (2024). Key findings from the 2024 cloud security report. https://www.fortinet.com/blog/industry-trends/key-findings-cloud-security-report-2024

• Morgan Stanley. (2024). AI and cybersecurity: A new era. https://www.morganstanley.com/articles/ai-cybersecurity-new-era

• Darktrace. (2024). Why artificial intelligence is the future of cybersecurity. https://darktrace.com/blog/why-artificial-intelligence-is-the-future-of-cybersecurity

• Statista. (2023). Main benefits of incorporating AI into cybersecurity operations 2023. https://www.statista.com/statistics/1425575/top-benefits-of-incorporating-ai-into-cybersecurity-operations/

• McKinsey & Company. (2024). The cybersecurity provider's next opportunity: Making AI safer. https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-cybersecurity-providers-next-opportunity-making-ai-safer

• Practical DevSecOps. (2023). Top 15 DevSecOps best practices for 2025. https://www.practical-devsecops.com/devsecops-best-practices/

• MITRE SAF. (2023). DevSecOps best practices guide. https://saf.mitre.org/DevSecOps_Best_Practices_Guide.pdf

• Ivanchenko, Y., Shulha, V., Averichev, I., & Dubrovskyi, V. (2025). Класифікація та вплив кібератак, спрямованих на критично важливих постачальників послуг [Classification and impact of cyberattacks targeting critical service providers]. Information Technology: Computer Science, Software Engineering and Cyber Security, 2, 14–22. https://doi.org/10.32782/IT/2025-2-3

Downloads


Abstract views: 13

Published

2025-09-26

How to Cite

Averichev, I., Rozhenko, A., & Kykhtenko, Y. (2025). INNOVATIVE APPROACHES TO IMPROVING THE LEVEL OF CYBERSECURITY OF CORPORATE NETWORKS USING CLOUD TECHNOLOGIES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 732–747. https://doi.org/10.28925/2663-4023.2025.29.934