• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Just 10% of Firms Can Resolve Cloud Threats in an Hour

You are here: Home / General Cyber Security News / Just 10% of Firms Can Resolve Cloud Threats in an Hour
March 7, 2023

Two-thirds (39%) of global companies reported a surge in breaches above the earlier 12 months, with IT complexity expanding and detection and response abilities worsening, according to Palo Alto Networks.

The security vendor polled more than 2500 respondents in the US, Australia, Germany, France, Japan, Singapore and the UK to compiles its latest study, The Condition of Cloud Indigenous Security Report 2023.

It found that as enterprises move much more of their details and workloads to the cloud, they are finding it more and more difficult to explore and remediate incidents rapidly.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Over two-fifths (42%) noted an boost in suggest time to remediate, when 90% stated they are not able to detect, incorporate and resolve cyber-threats inside an hour. Just about a third (30%) noted a key boost in intrusion tries and unplanned downtime.

Portion of the challenge seems to be the complexity of their cloud security environments – partly prompted by software bloat.

A few-quarters (76%) said that the number of cloud security resources they use creates blind spots that have an affect on their capacity to prioritize risk and protect against threats, even though a equivalent share (77%) said they wrestle to discover what equipment are necessary to accomplish their goals.

A past Palo Alto examine unveiled that organizations depend on in excess of 30 resources for security, such as 6–10 cloud security items.

The report discovered the top challenges to cloud security as:

  • Handling holistic security throughout groups, so that development, functions, security and all other stakeholders function with a perception of shared responsibility to make “shift-left” a truth
  • Embedding security throughout the cloud-native progress lifecycle, so that only the right solutions are utilized at the right stage of application advancement
  • Education workers to use security instruments effectively, throughout code, workloads, identities and facts, and environments including PaaS, containers and serverless
  • Lack of visibility into cloud vulnerabilities, which could be tackled by remedies to present continuous and in the vicinity of true-time detection of misconfigurations, vulnerabilities and threats throughout the full application lifecycle
  • Discovering the ideal security tools to fit the needs of the organization. Teams will need offerings that give adaptability and option to foreseeable future-proof cloud security

Some pieces of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Brazilian Conglomerate Suffers 3TB Data Breach: Report
Next Post: SYS01stealer: New Threat Using Facebook Ads to Target Critical Infrastructure Firms sys01stealer: new threat using facebook ads to target critical infrastructure»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL

Copyright © TheCyberSecurity.News, All Rights Reserved.