• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Just 10% of Firms Can Resolve Cloud Threats in an Hour

You are here: Home / Cyber Security News / Just 10% of Firms Can Resolve Cloud Threats in an Hour

Two-thirds (39%) of worldwide organizations claimed a surge in breaches above the past year, with IT complexity raising and detection and response abilities worsening, in accordance to Palo Alto Networks.

The security seller polled more than 2500 respondents in the US, Australia, Germany, France, Japan, Singapore and the British isles to compiles its latest examine, The Point out of Cloud Native Security Report 2023.

It discovered that as enterprises move a lot more of their data and workloads to the cloud, they’re locating it increasingly tough to discover and remediate incidents swiftly.

In excess of two-fifths (42%) noted an maximize in mean time to remediate, though 90% said they are not able to detect, include and solve cyber-threats inside an hour. Almost a third (30%) documented a major increase in intrusion tries and unplanned downtime.

Element of the obstacle seems to be the complexity of their cloud security environments – partly induced by instrument bloat.

Three-quarters (76%) explained that the quantity of cloud security tools they use produces blind spots that influence their capability to prioritize risk and stop threats, even though a equivalent share (77%) mentioned they battle to determine what tools are necessary to realize their goals.

A prior Palo Alto study disclosed that companies depend on around 30 resources for security, such as 6–10 cloud security solutions.

The report discovered the top troubles to cloud security as:

  • Running holistic security throughout groups, so that development, operations, security and all other stakeholders function with a feeling of shared obligation to make “shift-left” a reality
  • Embedding security across the cloud-indigenous growth lifecycle, so that only the ideal options are employed at the ideal stage of application development
  • Instruction staff to use security tools correctly, throughout code, workloads, identities and facts, and environments together with PaaS, containers and serverless
  • Absence of visibility into cloud vulnerabilities, which could be addressed by answers to deliver continuous and close to real-time detection of misconfigurations, vulnerabilities and threats across the entire software lifecycle
  • Discovering the appropriate security equipment to accommodate the requirements of the business. Groups want choices that give adaptability and alternative to future-evidence cloud security
Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Brazilian Conglomerate Suffers 3TB Data Breach: Report
Next Post: Computer model IDs roles of individual genes in early embryonic development AllTech.News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS
  • New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Copyright © 2025 · AllTech.News, All Rights Reserved.