logo
#

Latest news with #WebApplicationFirewalls

Cloud security gaps widen as AI threats outpace defences
Cloud security gaps widen as AI threats outpace defences

Techday NZ

time3 days ago

  • Techday NZ

Cloud security gaps widen as AI threats outpace defences

Check Point has released its 2025 Cloud Security Report, revealing ongoing challenges faced by enterprises in protecting multi-cloud environments against evolving cyber threats. The report draws on a global survey of more than 900 Chief Information Security Officers (CISOs) and IT leaders, offering detailed insights into cloud security priorities, operational risks, and emerging trends such as generative AI threats and increasing infrastructure complexity. According to the findings, 65% of surveyed organisations experienced a cloud-related security incident in the past year, an increase from 61% the previous year. Only 9% detected incidents within the first hour, and just 6% were able to remediate breaches in that timeframe, providing cyber attackers with extended access across cloud environments. Paul Barbosa, Vice President of Cloud Security at Check Point, commented, "Security teams are chasing an ever-moving target. As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world." The report's data indicates that cloud adoption is outpacing organisations' security readiness. While 62% of organisations have embraced cloud edge technologies, 57% deploy hybrid cloud models, and 51% operate in multi-cloud environments, many continue to rely on legacy, perimeter-based defences which prove inadequate for these distributed architectures. Detection and remediation of security incidents remains a major challenge. Only 9% of organisations identified incidents within the first hour, while 62% required more than 24 hours to remediate breaches, giving attackers opportunities to escalate their access. The prevalence of tool sprawl is another concern highlighted in the report. A significant 71% of respondents use more than 10 different cloud security tools, with 16% using over 50. As a result, more than half of these organisations contend with nearly 500 alerts daily, which hinders response times and overwhelms security analysts. When addressing application security, the report finds that 61% of organisations still depend on outdated, signature-based Web Application Firewalls (WAFs). These legacy tools are increasingly ineffective against sophisticated, AI-enhanced cyber threats. Artificial intelligence is a growing focus for cyber defence, with 68% of respondents ranking AI as a top priority. However, only 25% feel adequately prepared to counter AI-driven attacks, revealing a substantial gap in defensive capabilities. Lateral movement within cloud environments - a tactic that enables attackers to navigate undetected once inside a network—remains a critical blind spot. Only 17% of organisations report having full visibility into east-west cloud traffic, making it easier for adversaries to avoid detection following an initial breach. The report also points to shortcomings in threat detection mechanisms. Only 35% of cloud incidents were identified via security monitoring platforms. The majority were discovered by employees, routine audits, or through external reporting, demonstrating limitations in real-time threat detection systems. Internal organisational challenges further complicate effective cloud security. Over half of respondents (54%) cite the rapid pace of technological change as a major hurdle, and 49% report a shortage of skilled security professionals. Tool fragmentation and inadequate integration (experienced by 40%) also contribute to slower response times and increased risk of undetected incidents. In response to these ongoing issues, Check Point recommends organisations move toward decentralised, prevention-first cloud security strategies. This approach includes consolidating security toolsets, adopting AI-based threat detection, and deploying real-time telemetry to achieve comprehensive visibility across edge, hybrid, and multi-cloud infrastructures. By using platforms such as Check Point CloudGuard and the Check Point Infinity Platform, the company suggests that organisations can unify cloud defences, automate incident response processes, and maintain consistent policy enforcement across all environments regardless of the underlying technology or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies, provides guidance in the report and emphasises, "cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries." The 2025 Cloud Security Report was prepared by Cybersecurity Insiders, surveying 937 cybersecurity professionals worldwide, including CISOs, cloud architects, security analysts, and IT leaders. The research addresses how businesses securing hybrid, multi-cloud, and SaaS environments are responding to current threats, with particular focus on advancements such as artificial intelligence and the heightened complexity of modern cloud security.

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report

Yahoo

time3 days ago

  • Business
  • Yahoo

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report

Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience. As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can't keep up. According to the report, 65% of organizations experienced a cloud-related security incident in the past year—up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments. 'Security teams are chasing an ever-moving target,' said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. 'As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world.' Key findings from the 2025 Cloud Security Report include: Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can't keep up with these distributed infrastructures Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts Application Security Lags Behind: 61% still rely on outdated, signature-based Web Application Firewalls (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats AI is a Priority — but Defenders Aren't Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging Check Point CloudGuard and the Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, 'cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.' To access the full report and receive actionable CISO advice for safeguarding against the cloud-related issues discussed, please visit our website and read our blog. About the Survey: The 2025 Cloud Security Report, carried out by Cybersecurity Insiders in the beginning of 2025, gathered insights from 937 cyber security professionals across North America, Europe, Asia-Pacific, and other regions. Respondents included CISOs, cloud architects, security analysts, and IT leaders responsible for securing hybrid, multi-cloud, and SaaS environments. The study focused on how businesses using cloud services tackle security issues and highlight advancements, like artificial intelligence, emphasizing the complexity of modern cloud security. Follow Check Point via:LinkedIn: YouTube: ​​​About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. ( is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point's prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers. This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point's industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law. MEDIA CONTACT: INVESTOR CONTACT: Ana Perez Kip E. Meintzer Check Point Software Technologies Check Point Software Technologies press@ ir@ while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store