Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»Tools»Cloud Security Needs Solutions, Not More Alerts
Tools

Cloud Security Needs Solutions, Not More Alerts

CloudSecNewsHubBy CloudSecNewsHubAugust 13, 2024No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Cloud Security Needs Solutions, Not More Alerts
Share
Facebook Twitter LinkedIn Pinterest Email

Chief Innovation Officer at Orca Security.

Getty

As cloud computing has evolved and expanded, the cloud security industry has focused on a series of key issues, each taking turns at the top of the priority pile. Misconfiguration risks have given way to identity and access management (IAM) issues, which have given way to securing Kubernetes containers, and finally to API security. The industry is constantly identifying new types of security issues, deeming them the most important until the next “hot topic” in security comes along and takes their place, often before the industry has figured out an effective way to fix the first one.

However, there is a persistent problem that many organizations are neglecting the basics of security. Recent research by Orca Security has uncovered alarming omissions among organizations operating in the cloud, from high rates of neglected assets and compromised data to weak identity and access management controls and exposed API servers in Kubernetes.

Each instance of a basic security problem, such as an unpatched server or a serious vulnerability in an application, may seem easy to fix individually. But in a multi-layered cloud organization with multiple stakeholders—many of whom may lack security expertise—these issues can snowball into larger problems that pile up without resolution.

Innovators in the cloud security industry may feel frustrated by this trend, wondering why they should continue to develop new tools and solutions if they don’t seem to be used. But the reality is that the cloud security industry needs to emphasize a pragmatic approach. It’s not about too many problems, but too few solutions.

It doesn't come with alerts, it comes with fixes.

The issues facing cloud infrastructure are real, of course, whether they are misconfigurations, vulnerabilities, data issues, or other problems. The industry needs to address these issues, and innovative tools and solutions that identify problem areas are valuable. But organizations don’t need thousands of additional alerts—they need help mitigating them. In fact, I can confidently say that I have never met a security leader who told me they didn’t have enough alerts to fix.

As security providers, we need to look at these issues in context. Prioritization shouldn’t be based on the severity of a CVE in an application, for example, but rather on where that application is in the stack and how critical it is to business production. We need to simplify the remediation process. This will reduce the number of issues that are prioritized for the practitioner to fix. But that’s often not enough.

The goal should be to reduce those issues that need to be prioritized along with the amount of work required by practitioners to fix them. Risk logging should be a byproduct of this, with them prioritized as much as possible in the context of the work to reduce the number of fixes. In short: don’t come with alerts – come with fixes and make those fixes easier to implement.

Leveraging the capabilities of AI while recognizing its limitations is an important part of a practical approach to cloud security. Consider a self-driving car powered by AI. It doesn’t actually drive itself. It needs a human to supervise it, tell it where to go, and be ready to take over when necessary. But AI is essential to its operation, and its capabilities greatly reduce the workload for the human driver. We need to take the same approach to cloud security.

One way AI can help is by connecting production to enterprise developers. In many organizations, security engineers spend a significant portion of their time identifying the source of an issue in production and then finding the person responsible for fixing it. When that percentage is doubled in a cloud environment, identifying all of these issues can become a daunting task. Organizations have reported taking weeks to find all of the items that need fixing.

AI’s ability to quickly collect and analyze massive amounts of data can speed up this process as it begins to address many problems. This can significantly reduce the work of developers, allowing them to focus on more strategic projects.

Cloud Security Basics

The vastness and complexity of multi-cloud infrastructure creates an environment rife with vulnerabilities, configuration flaws, and, as our research shows, neglect of basic security. Identifying vulnerabilities and areas that need to be addressed is important, but organizations need more than just alerts. The cloud security industry must recognize that organizations need hands-on help to resolve issues as quickly and easily as possible.

We need:

• Prioritize security alerts within the business context.

• Focus on providing solutions, in addition to identifying problems.

The same tools, like AI, that are used to help identify and define problems can also be used to help provide solutions. Some problems can be fixed automatically. For others, security providers can reduce the amount of work needed to fix them. We can provide all the necessary data, identify who needs to be involved, and set up the first steps to take toward fixing the problem.

By taking this approach, cloud security providers can effectively reduce the need for manual work, reduce the overall number of security issues, and ultimately make them easier to fix. In the process, we can help improve the state of cloud security.

The Forbes Technology Council is an invitation-only community for world-class CIOs and technology executives. Am I eligible?

alerts cloud security Solutions
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article3 Cloud Security Stocks That Could Benefit from Rising Cyber ​​Threats
Next Article Buyer's Guide to Comprehensive Cloud Security – Intelligent CIO Middle East
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
News

The most prominent report: 2025 Experience of exposure to cloud data

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?