INNOVATIVE APPROACHES TO IMPROVING THE LEVEL OF CYBERSECURITY OF CORPORATE NETWORKS USING CLOUD TECHNOLOGIES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.858

Keywords:

cybersecurity, corporate networks, cloud technologies, Zero Trust, artificial intelligence, DevSecOps, cloud security, cyber threats, data protection, multi-factor authentication

Abstract

Modern methods and approaches to enhancing the level of cybersecurity in corporate networks in the context of cloud technology usage have been examined. The threats associated with cloud computing are analyzed, and effective innovative protection models are proposed, including Zero Trust Architecture, AI-based threat detection approaches, blockchain integration, container security, and encryption with key management policies. These ensure a multi-layered and adaptive security system capable of promptly responding to evolving threat types and minimizing potential risks of data leakage or compromise. The application of these approaches enables the creation of a resilient environment in which corporate information remains protected even under increasing complexity and intensity of cyberattacks. Emphasis is also placed on the importance of an integrated security approach that combines technical, organizational, and administrative measures. In today’s environment of rapid IT development and growing business dependence on cloud infrastructure, it is crucial not only to implement innovative protection tools but also to ensure their integration into a unified security management system. This system should cover all levels of the corporate network—from edge devices to cloud platforms—including access policies, encryption, authentication, user behavior monitoring, and real-time incident analytics. The comprehensiveness and coherence of such solutions not only increase the level of technical protection but also promote the development of a cybersecurity culture within the organization, where every element of the infrastructure is viewed both as a potential target and as an active participant in the defensive perimeter. The following sections will examine the main threats inherent in cloud environments and provide a detailed analysis of innovative approaches to their detection and mitigation.

Downloads

Download data is not yet available.

References

Zhurakovskyi, B., Averichev, I., & Shakhmatov, I. (2023). Using the Latest Methods of Cluster Analysis to Identify Similar Profiles in Leading Social Networks. Information Technology and Implementation (Satellite) Conference Proceedings.

Ponochovny, P. (2024). Low-speed http ddos attack prevention model for end users. Cybersecurity: education, science, technique, 2(26), 291–304.: https://doi.org/10.28925/2663-4023.2024.26.695

Hasan, M. (2024). Enhancing Enterprise Security with Zero Trust Architecture. arXiv. https://arxiv.org/abs/2410.18291

Ahmed, S., Shihab, I.F., & Khokhar, A. (2025). Quantum-driven Zero Trust Framework with Dynamic Anomaly Detection in 7G Technology: A Neural Network Approach. arXiv. https://arxiv.org/abs/2502.07779

Ghasemshirazi, S., Shirvani, G., Alipour, M.A. (2023). Zero Trust: Applications, Challenges, and Opportunities. arXiv. https://arxiv.org/abs/2309.03582

Rahmati M. (2025). Federated Learning-Driven Cybersecurity Framework for IoT Networks with Privacy-Preserving and Real-Time Threat Detection Capabilities. arXiv. https://arxiv.org/abs/2502.10599

Top Threats to Cloud Computing 2025. (2025). Cloud Security Alliance. https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-2025

The Future of Cloud Security: 7 Key Trends in 2025. (2025). Softprom. https://softprom.com/the-future-of-cloud-security-7-key-trends-in-2025

Top Cloud Security Trends in 2025. (2025). Check Point Software. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-code-security/top-cloud-security-trends-in-2025/

The Evolving Synergy of Cybersecurity and Cloud Computing: Trends, Opportunities, and Challenges. (2024). MarketsandMarkets. https://www.marketsandmarkets.com/blog/ICT/The-Evolving-Synergy-Of-Cybersecurity-And-Cloud-Computing

Cloud Security Trends for 2025: Advanced Strategies & Solutions. (2025). Xsoft-Tech. https://xsoft-tech.com/blog/top-cloud-security-strategies-solutions

New Cybersecurity Technologies in 2025: Innovations, Trends, and Insights. (2025). IT Strategy News. https://itstrategynews.com/new-cybersecurity-technologies-in-2025-innovations-trends-and-insights/

Implementing a Zero Trust Architecture. (n.d.) National Cybersecurity Center of Excellence (NCCoE). https://www.nccoe.nist.gov/projects/implementing-zero-trust-architecture

What is Zero Trust? – Guide to Zero Trust Security. (2025). CrowdStrike. https://www.crowdstrike.com/en-us/cybersecurity-101/zero-trust-security/

GSA. Zero Trust Architecture. (2025). https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/it-security/zero-trust-architecture

Top 6 Cloud Security Trends in 2024. (2024). Check Point Software. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/top-6-cloud-security-trends-in-2024/

2024 Cloud Security Study – Global Edition. (2024). Thales Group. https://cpl.thalesgroup.com/cloud-security-research

2024 State of Cloud Native Security Report. (2024). Palo Alto Networks. https://www.paloaltonetworks.com/resources/research/state-of-cloud-native-security-2024

Key Findings from the 2024 Cloud Security Report. (2024). Fortinet. https://www.fortinet.com/blog/industry-trends/key-findings-cloud-security-report-2024

AI and Cybersecurity: A New Era. (2024). Morgan Stanley. https://www.morganstanley.com/articles/ai-cybersecurity-new-era

Why Artificial Intelligence is the Future of Cybersecurity. (2024). Darktrace. https://darktrace.com/blog/why-artificial-intelligence-is-the-future-of-cybersecurity

Main benefits of incorporating AI into cybersecurity operations 2023. (2023). Statista. https://www.statista.com/statistics/1425575/top-benefits-of-incorporating-ai-into-cybersecurity-operations/

The cybersecurity provider’s next opportunity: Making AI safer. (2024). McKinsey & Company. https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-cybersecurity-providers-next-opportunity-making-ai-safer

Top 15 DevSecOps Best Practices for 2025. (2023). Practical DevSecOps. https://www.practical-devsecops.com/devsecops-best-practices/

DevSecOps Best Practices Guide. (2023). MITRE SAF. https://saf.mitre.org/DevSecOps_Best_Practices_Guide.pdf

Ivanchenko, Y., Averichev, I., & Kikhtenko, Y. (2025). Research of mechanisms for improving the efficiency of computer network protection against polymorphic computer viruses. Information Technology: Computer Science, Software Engineering and Cyber Security, 1, 82–90.

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Ivanchenko, Y., Rozhenko, A., & Berestyana, T. (2025). INNOVATIVE APPROACHES TO IMPROVING THE LEVEL OF CYBERSECURITY OF CORPORATE NETWORKS USING CLOUD TECHNOLOGIES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 656–670. https://doi.org/10.28925/2663-4023.2025.28.858