Blue Hexagon comments on cloud security research

Research from ESG and Cado Security reveals 89% of 150 companies surveyed have experienced a negative outcome in the time between detection and investigation of a cyber-attack on their cloud environments. Research further revealed it takes an average of 3.1 days to begin an investigation of a known cloud breach after data capture and processing. Other key findings include:

  • 74% of security professionals say their organisations need additional data and context to conduct forensics investigations in cloud environments.
  • 64% say it takes too much time to collect and process data to perform a timely investigation.
  • 35% of cloud security alerts are not investigated.

Saumitra Das, CTO and Co-Founder, at Blue Hexagon said, “This is very important research and a key issue we see within organisations. Cloud security has too often been left to developers and ops people who are not security experts. There is too much focus on hygiene and hardening despite the fact that a fully hardened cloud with no misconfigurations is a very hard goal to achieve. As a result, organisations do not even have visibility into an attack, both when it is happening or for incident response and forensics. There needs to be renewed focus on cloud threat detection and response and not just posture assessment and hardening. In addition, cloud security alerts need to be prioritised so the most egregious problems get fixed otherwise there will just be a deluge of tickets to be worked on which then explains the 3.1 days.”

“The key here is not 3.1 days but whether the important problems are fixed in hours and the less risky ones fixed over time.”

 

To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Qualys

Qualys Acquires Blue Hexagon’s AI/Machine Learning Platform

AI/ML technology to transform Qualys’ massive data lake into a powerful predictive analytics platform that performs real-time zero-day threat detection

Radware unveils new cloud security centre

Radware, a provider of cyber security and application delivery solutions, announced the launch of a new cloud security centre in the United Arab Emirates.

Barracuda to demonstrate innovations at GITEX 2022

Having unveiled a series of updates across its security portfolio, Barracuda, a provider of cloud-first security solutions, is now heading to GITEX 2022.
Neustar Security Services

Neustar Security Services expands partner network

Neustar Security Services has expanded its partner ecosystem across key technology hubs in the Europe, Middle East and Africa region.

Lookout Appoints Deborah Wolf as Chief Marketing Officer

Lookout, Inc., a provider of cloud security solutions, today announced the appointment of marketing executive Deborah Wolf as its new CMO.

Gallagher Gears Up For GSX

Gallagher is geared up to attend the Global Security Exchange (GSX), taking place at Georgia World Congress Centre in Atlanta from 12-14 September 2022.

Aqua Trivy receives CPSM addition

Aqua Security today announced the addition of cloud security posture management (CPSM) capabilities to the open source tool Aqua Trivy.

Aqua Trivy receives CPSM addition

Aqua Security today announced the addition of cloud security posture management (CPSM) capabilities to the open source tool Aqua Trivy.

Tenable Achieves AWS Security Competency Status

Tenable achieved the Application Security distinction in the Amazon Web Services (AWS) Security Competency.
Scroll to Top