DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Cloud security of many organizations contains structural weaknesses

DigitalCIO Bureau by DigitalCIO Bureau
June 7, 2025
in Tech News
0
Cloud security of many organizations contains structural weaknesses
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Check Point Software Technologies has released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience.

As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can’t keep up.  According to the report, 65% of organizations experienced a cloud-related security incident in the past year- up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments.

“Security teams are chasing an ever-moving target,” said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. “As cloud environments grow more complex and AI-driven threats evolve, organizations can’t afford to be stuck with fragmented tools and legacy approaches. It’s time to shift toward unified, intelligent, and automated defenses designed for the realities of today’s decentralized world.”

Key findings from the 2025 Cloud Security Report include:

  • Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can’t keep up with these distributed infrastructures
  • Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access
  • Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts
  • Application Security Lags Behind: 61% still rely on outdated, signature-based Web Application Firewalls (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats
  • AI is a Priority — but Defenders Aren’t Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap.
  • Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments
  • Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection
  • Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots

To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging Check Point CloudGuard and the Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider.

Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, “cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.”

Tags: Check Point Software TechnologiesPaul Barbosa
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Digital Fraud Overtakes Ransomware as CEOs’ Biggest Concern

by DigitalCIO Bureau
January 19, 2026
0
Retail Industry — Next Big Target for Hackers?

Artificial intelligence, geopolitical fragmentation and a surge in cyber-enabled fraud are redefining the global cyber risk landscape at unprecedented speed, according to the World Economic Forum’s Global Cybersecurity Outlook...

Read moreDetails

Cyera Secures $400M Series F, Hits $9B Valuation

by DigitalCIO Bureau
January 13, 2026
0
Cyera Secures $400M Series F, Hits $9B Valuation

Cyera has announced a $400 million Series F funding round, bringing its total funding to over $1.7 billion. This raise comes just six months after the previous round...

Read moreDetails

Trend Micro Closes Vulnerabilities in Apex Central

by DigitalCIO Bureau
January 9, 2026
0
Financial organizations receive an average of 2200+ application security vulnerability alerts every month: Dynatrace CISO Regional Bank 2023 report

The National Cyber ​​Security Centre (NCSC) is warning of vulnerabilities in Trend Micro Apex Central. These vulnerabilities could potentially cause a Denial-of-Service (DoS) attack. Updates addressing the vulnerability...

Read moreDetails

Aditya Birla Ventures invests in GenAI Company Articul8 AI

by DigitalCIO Bureau
January 9, 2026
0
AMD Acquires Open-Source AI Software Expert Nod.ai

Aditya Birla Ventures has announced its investment in the first tranche of Articul8 AI, Inc.’s oversubscribed Series B financing round. Articul8 AI, an enterprise generative AI (GenAI) software...

Read moreDetails

Snowflake Acquires Observe

by DigitalCIO Bureau
January 9, 2026
0
CRISIL To Acquire Bridge To India Energy

Snowflake has signed a definitive agreement to acquire Observe, a leader in AI-powered observability. With this acquisition, Snowflake will deliver the next generation of AI-powered observability, built on open standards...

Read moreDetails
Next Post
Fortinet Expands Universal SASE Coverage with Two New India-Based Data Centres   

Fortinet Survey Reveals Up to 3X Surge in AI-Powered Threats In India

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Fortinet Gets Recognized By Gartner

Fortinet Gets Recognized By Gartner

September 25, 2023

VIAVI and Select Vendor Partners Leading Evolution to Distributed Access Architecture

September 26, 2019

Why One Third Companies are PCI DSS Compliance Globally

November 12, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?