Cloud Security Teams Struggle to Resolve Security Threats
A 2025 ZEST Cloud Risk report reveals that 62% of cyberattacks stem from unaddressed vulnerabilities security threats in cloud computing, highlighting that cloud security threats persist not due to detection failures but poor performance in risk mitigation.
The problem of security threats to Cloud data isn’t detection, it is performance.
Today’s security tools that fight threats to cloud security are becoming more powerful than before, but the very same security threats with cloud computing remain unaddressed.
“In nearly every case, the vulnerability or misconfiguration used to gain initial access was something the security team already knew about,” explains Mor Levi, Salesforce’s Vice President of Security.
Snir Ben Shimol, CEO of ZEST Security, points out that “remediation technologies” are still not fully developed and the team is still following a manual workflow which is still slow.
Such inefficiencies pave the way for more security threats in cloud computing, granting attackers unrestricted access to exploit data systems. Alarmingly, attackers are outpacing defenders, creating a gap in cybersecurity readiness.
According to Mandiant research, while security teams may take weeks or longer to address vulnerabilities, attackers can exploit them in just five minutes.
The lag in cloud security threat detection provides attackers with a window to launch their cyber assaults. Compounding the issue, the delayed remediation of cloud computing security threats often leads to colossally staggering financial costs.
According to ZEST’s report, organizations spend more than $2 million annually for remediation efforts alone. When adding the other costs of breaches, regulatory fines, and reputational damage, then the overall cost of slow remediation will be even higher.
Security teams are under increasing operational pressure, and unresolved vulnerabilities are directly contributing to increased exposure and heightened risk of security threats in Cloud computing.
Faster Remediations
To help close the remediation gap, organizations are moving away from a visibility-driven security model to one that is resolution-focused.
The key strategies that are beginning to emerge are the following:
- Effort-Based Prioritization: Security teams now focus first on vulnerability that take minimal effort to fix but grant maximum risk reduction to help clear backlogs faster.
- Automation: Manual processes are unsustainable. So, shifting to automation, root cause analysis, ticket management, and security teams can handle higher-priority vulnerabilities faster.
- Mitigation Strategies: Where complete remediation is not possible, security teams adopt various mitigations like Web Application Firewalls (WAFs) and network segmentation, to limit the attack while waiting for long-term solutions.
Future Implications
With the growing tensions along with cyber threats, regulators are concerned about their expectations for vulnerability remediation. Many security agencies are trying to limit the risks in shorter times and failure to meet the expectations can bring further risks.
A fast solution is needed to detect and resolve Cloud security threats in Cloud computing in addition, stricter regulations should be imposed to elevate security systems.
Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Tech sections to stay informed and up-to-date with our daily articles.