• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Just 10% of Firms Can Resolve Cloud Threats in an Hour

You are here: Home / General Cyber Security News / Just 10% of Firms Can Resolve Cloud Threats in an Hour
March 7, 2023

Two-thirds (39%) of global companies reported a surge in breaches above the earlier 12 months, with IT complexity expanding and detection and response abilities worsening, according to Palo Alto Networks.

The security vendor polled more than 2500 respondents in the US, Australia, Germany, France, Japan, Singapore and the UK to compiles its latest study, The Condition of Cloud Indigenous Security Report 2023.

It found that as enterprises move much more of their details and workloads to the cloud, they are finding it more and more difficult to explore and remediate incidents rapidly.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Over two-fifths (42%) noted an boost in suggest time to remediate, when 90% stated they are not able to detect, incorporate and resolve cyber-threats inside an hour. Just about a third (30%) noted a key boost in intrusion tries and unplanned downtime.

Portion of the challenge seems to be the complexity of their cloud security environments – partly prompted by software bloat.

A few-quarters (76%) said that the number of cloud security resources they use creates blind spots that have an affect on their capacity to prioritize risk and protect against threats, even though a equivalent share (77%) said they wrestle to discover what equipment are necessary to accomplish their goals.

A past Palo Alto examine unveiled that organizations depend on in excess of 30 resources for security, such as 6–10 cloud security items.

The report discovered the top challenges to cloud security as:

  • Handling holistic security throughout groups, so that development, functions, security and all other stakeholders function with a perception of shared responsibility to make “shift-left” a truth
  • Embedding security throughout the cloud-native progress lifecycle, so that only the right solutions are utilized at the right stage of application advancement
  • Education workers to use security instruments effectively, throughout code, workloads, identities and facts, and environments including PaaS, containers and serverless
  • Lack of visibility into cloud vulnerabilities, which could be tackled by remedies to present continuous and in the vicinity of true-time detection of misconfigurations, vulnerabilities and threats throughout the full application lifecycle
  • Discovering the ideal security tools to fit the needs of the organization. Teams will need offerings that give adaptability and option to foreseeable future-proof cloud security

Some pieces of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Brazilian Conglomerate Suffers 3TB Data Breach: Report
Next Post: SYS01stealer: New Threat Using Facebook Ads to Target Critical Infrastructure Firms sys01stealer: new threat using facebook ads to target critical infrastructure»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.