
"Security teams are missing cloud breaches due to cybersecurity alert fatigue, fragmented tools, and clunky legacy applications, according to experts. Gaps in security can happen because of misconfigured storage or overly permissive access controls, which end up exposing data without triggering alerts, says Andy Green, a partner at Avella Security. Businesses often fail to enable or properly use logging services such as AWS CloudTrail or Azure Monitor, so suspicious activity goes unnoticed, which just adds to the problem."
""And when monitoring is in use, security teams face alert fatigue, while critical warnings are buried among low-priority notifications and don't get actioned," Green adds. This is made more complex by fragmented, hybrid environments with legacy perimeter defences not designed for cloud scale, which can lead to visibility gaps, says Dray Agha, senior manager of security operations at Huntress. Simon Driscoll, network and security specialist at ITGL, agrees."
Cloud incidents affected nearly two-thirds of organizations in the past year, yet detection and remediation remain slow: only 9% of breaches are detected within the first hour and only 6% are remediated that quickly, while 62% take more than 24 hours to recover. Slow response increases risk of data theft, follow-on attacks, reputational harm, and regulatory fines. Causes include cybersecurity alert fatigue, fragmented tooling, legacy perimeter controls, misconfigured storage, overly permissive access controls, and failure to enable or properly use logging services such as AWS CloudTrail or Azure Monitor. Fragmented hybrid environments create visibility gaps that further delay action.
Read at IT Pro
Unable to calculate read time
Collection
[
|
...
]