{"id":356234,"date":"2025-06-30T12:40:52","date_gmt":"2025-06-30T07:10:52","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=356234"},"modified":"2025-06-30T12:40:52","modified_gmt":"2025-06-30T07:10:52","slug":"report-finds-65-of-organizations-suffered-a-cloud-security-incident-in-the-past-year-yet-only-6-remediated-it-within-an-hour","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/report-finds-65-of-organizations-suffered-a-cloud-security-incident-in-the-past-year-yet-only-6-remediated-it-within-an-hour\/","title":{"rendered":"Report finds 65% of organizations suffered a cloud-security incident in the past year \u2013 yet only 6% remediated it within an hour"},"content":{"rendered":"<p id=\"pr-title\" class=\"primary-pink\"><span style=\"font-family: georgia, palatino, serif;\"><strong><span style=\"font-size: 14pt;\">Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point\u2019s 2025 Cloud Security Report<\/span><\/strong><\/span><\/p>\n<div id=\"post-283898\" class=\"post-283898 press-releases type-press-releases status-publish hentry cp_press_release_type-corporate-press\">\n<div class=\"post-entry\">\n<div class=\"cp_press_release_content\">\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Check Point Software Technologies Ltd., a pioneer and global leader of cyber security solutions, recently released its <strong>2025 Cloud Security Report.<\/strong> Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can\u2019t keep up. \u00a0According to the report, 65% of organizations experienced a cloud-related security incident in the past year- up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u201cSecurity teams are chasing an ever-moving target,\u201d said <strong>Paul Barbosa, VP of Cloud Security at Check Point Software Technologies.<\/strong> \u201cAs cloud environments grow more complex and AI-driven threats evolve, organizations can\u2019t afford to be stuck with fragmented tools and legacy approaches. It\u2019s time to shift toward unified, intelligent, and automated defenses designed for the realities of today\u2019s decentralized world.\u201d<\/span><\/p>\n<p><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Key findings from the 2025 Cloud Security Report include:<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Cloud Adoption Outpaces Security Readiness:<\/strong>\u00a062% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can\u2019t keep up with these distributed infrastructures<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Detection and Remediation Are Too Slow<\/strong>: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches\u2014giving attackers ample time to escalate access<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Tool Sprawl is Fueling Alert Fatigue:<\/strong>\u00a0A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Application Security Lags Behind:<\/strong>\u00a061% still rely on outdated, signature-based\u00a0Web Application Firewalls\u00a0(WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>AI is a Priority \u2014 but Defenders Aren\u2019t Ready:<\/strong>\u00a0While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Lateral Movement Remains a Blind Spot:\u00a0<\/strong>Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Detection Often Comes from People, Not Tools:\u00a0<\/strong>Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports\u2014revealing alarming gaps in real-time threat detection<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Internal Challenges Undermine Progress:\u00a0<\/strong>54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging\u00a0Check Point CloudGuard\u00a0and the\u00a0Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement\u2014regardless of platform or provider.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><strong>Deryck Mitchelson, Global CISO at Check Point Software Technologies<\/strong> provides guidance within the 2025 cloud security report and emphasizes that, \u201ccloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.\u201d<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point\u2019s 2025 Cloud Security Report Check Point Software Technologies Ltd., a pioneer and global leader of cyber security solutions, recently released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19016,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":{"0":"post-356234","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=356234"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356234\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/19016"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=356234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=356234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=356234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}