REGISTER

email 14 48

Organizations are struggling to detect increasingly sophisticated breaches, with over one-third reporting their security tools fail to identify breaches, according to Gigamon.

As hybrid cloud environments grow, 65% of respondents doubt their solutions’ effectiveness. Cloud complexity and AI-powered attacks increase cyber risks, with 83% citing cloud complexity as a concern. Despite projected global information security spending of $215 billion in 2024, only 54% feel well-prepared for unauthorized access in hybrid clouds.

Threat detection tools are acknowledged as weak. Only 25% remediated a recent live threat, with Germany at 30% and Australia/Singapore at 20%. Breach detection often occurs post-extortion threat (31%) or dark web data leaks (31%), rising to 42% in Australia.

Root cause analysis is lacking, with 25% failing to identify breach origins, increasing to 33% in Australia, Singapore, and the US. Complex hybrid cloud infrastructure and poor East-West visibility contribute to control issues. Although 85% prioritize cloud security at the board level, only 40% have East-West traffic visibility, down from 48% in 2023.

Encryption is another blind spot. Despite 93% of malware hiding in encrypted traffic, 76% trust encrypted traffic’s security. Tool strategies are critical, with 80% agreeing that unified visibility into hybrid cloud infrastructure is essential. Greater data-in-motion visibility is seen as key to deploying AI securely.

CISOs face heavy burdens, with 59% needing cyber risk as a board priority and 69% struggling with encrypted threats. Seventy percent believe their tools are inadequate, and 75% report their teams are overwhelmed by tool stacks.

Gigamon’s data is based on an online survey of 1,033 global respondents.

For additional context:

“Cyber risk is now top of the business risk register, yet over a third of breaches go undetected,” said Mark Jow, EMEA Technical Evangelist at Gigamon. “MELT-based approaches are insufficient; organizations need 360-degree visibility in hybrid clouds.”

“Tool stacks are falling short,” said Chaim Mazal, CSO at Gigamon. “Without real-time, network-derived intelligence into all data in motion, including East-West and encrypted traffic, AI-powered attackers will continue causing damage.”

CISOs bear significant regulatory and technological pressures, with 69% struggling to detect encrypted threats and 70% questioning tool effectiveness. Detection challenges and overwhelming tool stacks highlight the need for better security strategies.

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top