logo
#

Latest news with #2025CloudSecurityReport

Global survey finds gaps leave cloud security dangerously exposed
Global survey finds gaps leave cloud security dangerously exposed

Techday NZ

time2 days ago

  • Business
  • Techday NZ

Global survey finds gaps leave cloud security dangerously exposed

Check Point has released its 2025 Cloud Security Report, revealing systemic vulnerabilities in cloud security across global enterprises and highlighting key areas where risk and operational inefficiency are leaving organisations exposed. The report is based on a survey of 937 chief information security officers (CISOs) and IT leaders worldwide, focusing on the challenges faced in securing hybrid, multi-cloud, and edge environments. It documents that 65% of organisations suffered a cloud-related security incident in the past year, a rise from 61% in the previous year. The findings underscore the difficulties companies are experiencing in keeping up with rapid technological change and increasingly sophisticated cyber threats. Only 9% of organisations detected a cloud incident within the first hour, with just 6% managing to remediate such incidents in the same timeframe. This gap provides intruders with more opportunity to remain undetected and exploit weaknesses within cloud environments. Paul Barbosa, Vice President of Cloud Security at Check Point, commented: "Security teams are chasing an ever-moving target. As cloud environments grow more complex and AI-driven threats evolve, organisations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defences designed for the realities of today's decentralised world." The report highlights that cloud adoption continues to outpace security preparedness, with 62% of organisations now using cloud edge technologies, 57% operating hybrid cloud models, and 51% using multi-cloud strategies. Legacy, perimeter-based defences have proven inadequate in keeping pace with these distributed architectures. In terms of detection and remediation, the report found that most organisations remain vulnerable, as 62% took more than 24 hours to remediate breaches. This delay in response time presents attackers with a significant opportunity to escalate access and inflict greater harm. The complexity of cloud security toolsets emerged as an additional concern. The report found that 71% of respondents depend on more than 10 different cloud security tools, and 16% use over 50 tools. More than half of these respondents report experiencing nearly 500 security alerts each day. This high volume of alerts results in alert fatigue, which can slow response times and increase the likelihood that genuine threats are missed. Application security appears inadequate for combating modern threats, with 61% of organisations still relying on traditional, signature-based web application firewalls. These are increasingly ineffective against attacks enhanced by artificial intelligence. While 68% of respondents listed artificial intelligence as a top priority for cyber defence, only 25% felt confident in their ability to respond to AI-driven attacks, illustrating a significant gap in capability and readiness to address emerging threats. Visibility into lateral movement—where attackers move undetected between systems within a cloud environment—remains limited. Only 17% of organisations reported having full visibility into east-west cloud traffic. As a result, once attackers breach an initial perimeter, they often have the ability to move freely and undetected within cloud environments. Detection of threats is also problematic, with only 35% of incidents identified by automated security monitoring platforms. The majority are detected by employees, through audits, or via external reports, exposing shortcomings in real-time threat detection capabilities. Internal challenges further complicate progress. The report notes that 54% of respondents pointed to the rapid pace of technological change as a major obstacle. A shortage of skilled security professionals also represents a substantial barrier for 49% of those surveyed. In addition, 40% identified fragmented toolsets and poor integration between platforms as drivers that slow response and exacerbate visibility gaps. The survey was conducted by Cybersecurity Insiders in early 2025 and included CISOs, cloud architects, security analysts, and IT leaders from across North America, Europe, Asia-Pacific, and other regions. Respondents were asked about cloud security issues, the adoption of artificial intelligence, and the complexities associated with current security architectures. Check Point's recommendations include a move towards decentralised, prevention-focused cloud security strategies. The report advises organisations to consolidate their tools, adopt AI-powered threat detection, and implement real-time telemetry to achieve full visibility across all cloud deployments. The company suggests that using its CloudGuard and Infinity Platform solutions can help firms unify defences, automate incident response, and maintain consistent policy enforcement across platforms and providers. Deryck Mitchelson, Global CISO at Check Point, provided further perspective in the report: "Cloud transformation is accelerating faster than our defences. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries."

Cloud security gaps widen as AI threats outpace defences
Cloud security gaps widen as AI threats outpace defences

Techday NZ

time2 days ago

  • Techday NZ

Cloud security gaps widen as AI threats outpace defences

Check Point has released its 2025 Cloud Security Report, revealing ongoing challenges faced by enterprises in protecting multi-cloud environments against evolving cyber threats. The report draws on a global survey of more than 900 Chief Information Security Officers (CISOs) and IT leaders, offering detailed insights into cloud security priorities, operational risks, and emerging trends such as generative AI threats and increasing infrastructure complexity. According to the findings, 65% of surveyed organisations experienced a cloud-related security incident in the past year, an increase from 61% the previous year. Only 9% detected incidents within the first hour, and just 6% were able to remediate breaches in that timeframe, providing cyber attackers with extended access across cloud environments. Paul Barbosa, Vice President of Cloud Security at Check Point, commented, "Security teams are chasing an ever-moving target. As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world." The report's data indicates that cloud adoption is outpacing organisations' security readiness. While 62% of organisations have embraced cloud edge technologies, 57% deploy hybrid cloud models, and 51% operate in multi-cloud environments, many continue to rely on legacy, perimeter-based defences which prove inadequate for these distributed architectures. Detection and remediation of security incidents remains a major challenge. Only 9% of organisations identified incidents within the first hour, while 62% required more than 24 hours to remediate breaches, giving attackers opportunities to escalate their access. The prevalence of tool sprawl is another concern highlighted in the report. A significant 71% of respondents use more than 10 different cloud security tools, with 16% using over 50. As a result, more than half of these organisations contend with nearly 500 alerts daily, which hinders response times and overwhelms security analysts. When addressing application security, the report finds that 61% of organisations still depend on outdated, signature-based Web Application Firewalls (WAFs). These legacy tools are increasingly ineffective against sophisticated, AI-enhanced cyber threats. Artificial intelligence is a growing focus for cyber defence, with 68% of respondents ranking AI as a top priority. However, only 25% feel adequately prepared to counter AI-driven attacks, revealing a substantial gap in defensive capabilities. Lateral movement within cloud environments - a tactic that enables attackers to navigate undetected once inside a network—remains a critical blind spot. Only 17% of organisations report having full visibility into east-west cloud traffic, making it easier for adversaries to avoid detection following an initial breach. The report also points to shortcomings in threat detection mechanisms. Only 35% of cloud incidents were identified via security monitoring platforms. The majority were discovered by employees, routine audits, or through external reporting, demonstrating limitations in real-time threat detection systems. Internal organisational challenges further complicate effective cloud security. Over half of respondents (54%) cite the rapid pace of technological change as a major hurdle, and 49% report a shortage of skilled security professionals. Tool fragmentation and inadequate integration (experienced by 40%) also contribute to slower response times and increased risk of undetected incidents. In response to these ongoing issues, Check Point recommends organisations move toward decentralised, prevention-first cloud security strategies. This approach includes consolidating security toolsets, adopting AI-based threat detection, and deploying real-time telemetry to achieve comprehensive visibility across edge, hybrid, and multi-cloud infrastructures. By using platforms such as Check Point CloudGuard and the Check Point Infinity Platform, the company suggests that organisations can unify cloud defences, automate incident response processes, and maintain consistent policy enforcement across all environments regardless of the underlying technology or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies, provides guidance in the report and emphasises, "cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries." The 2025 Cloud Security Report was prepared by Cybersecurity Insiders, surveying 937 cybersecurity professionals worldwide, including CISOs, cloud architects, security analysts, and IT leaders. The research addresses how businesses securing hybrid, multi-cloud, and SaaS environments are responding to current threats, with particular focus on advancements such as artificial intelligence and the heightened complexity of modern cloud security.

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report

Yahoo

time3 days ago

  • Business
  • Yahoo

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report

Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience. As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can't keep up. According to the report, 65% of organizations experienced a cloud-related security incident in the past year—up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments. 'Security teams are chasing an ever-moving target,' said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. 'As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world.' Key findings from the 2025 Cloud Security Report include: Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can't keep up with these distributed infrastructures Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts Application Security Lags Behind: 61% still rely on outdated, signature-based Web Application Firewalls (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats AI is a Priority — but Defenders Aren't Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging Check Point CloudGuard and the Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, 'cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.' To access the full report and receive actionable CISO advice for safeguarding against the cloud-related issues discussed, please visit our website and read our blog. About the Survey: The 2025 Cloud Security Report, carried out by Cybersecurity Insiders in the beginning of 2025, gathered insights from 937 cyber security professionals across North America, Europe, Asia-Pacific, and other regions. Respondents included CISOs, cloud architects, security analysts, and IT leaders responsible for securing hybrid, multi-cloud, and SaaS environments. The study focused on how businesses using cloud services tackle security issues and highlight advancements, like artificial intelligence, emphasizing the complexity of modern cloud security. Follow Check Point via:LinkedIn: YouTube: ​​​About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. ( is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point's prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers. This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point's industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law. MEDIA CONTACT: INVESTOR CONTACT: Ana Perez Kip E. Meintzer Check Point Software Technologies Check Point Software Technologies press@ ir@ while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store