CLOUD TECHNOLOGIES AND CYBERSECURITY: INNOVATIVE APPROACHES TO BUSINESS PROTECTION IN UNSTABLE CONDITIONS
DOI:
https://doi.org/10.53920/ES-2024-4-14Keywords:
Cloud technologies, Economic security, Cybersecurity, Digital transformation, Strategic management, Information resilience, Adaptive management, Cloud infrastructure, Data protection, Risk management, Zero Trust architecture, Artificial intelligence, Innovative technologies, Blockchain, Business continuity, Cloud services, Digital security, Risk management, Cryptographic protection, Cloud strategyAbstract
The article is focused on the study of cloud technologies as a tool for ensuring cybersecurity and economic stability of enterprises in the context of the military aggression of the Russian Federation against Ukraine and general global instability. Cloud solutions are seen as a strategic resource for maintaining business continuity, increasing operational flexibility, and resilience to cyber threats, especially in the context of increased risks and physical destruction of infrastructure. The focus is on the cyber risks and threats accompanying cloud solutions and ways to minimize vulnerabilities through multi-level approaches to protecting information assets.
The article analyses practical cases of Ukrainian companies in the fields of telecommunications, energy, and pharmaceuticals that successfully use cloud technologies to maintain security and stability, particularly to back up critical business processes and ensure rapid infrastructure recovery. Based on the methods of analysis and synthesis, the article outlines strategies that can improve risk management, including the implementation of Zero Trust architecture and the integration of artificial intelligence and blockchain to increase transparency and control. Particular attention is paid to compliance with international security standards, such as ISO/IEC 27001, which increases customer and partner confidence in cloud solutions and allows businesses to meet strict regulatory requirements.
The results serve as a basis for developing cybersecurity strategies adapted to the challenges of modern conditions and help increase enterprises' competitiveness in high-risk industries. The conclusions highlight the need to create comprehensive and adaptive approaches to protecting information resources that will allow taking full advantage of the benefits of cloud technologies in today's dynamic environment.