{"id":631075,"date":"2023-04-19T09:56:03","date_gmt":"2023-04-19T14:56:03","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/04\/19\/report-security-teams-take-an-average-of-6-days-to-resolve-alerts\/"},"modified":"2023-04-19T09:56:03","modified_gmt":"2023-04-19T14:56:03","slug":"report-security-teams-take-an-average-of-6-days-to-resolve-alerts","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/04\/19\/report-security-teams-take-an-average-of-6-days-to-resolve-alerts\/","title":{"rendered":"Report: Security teams take an average of 6 days to resolve alerts\u00a0"},"content":{"rendered":"<div>\n<section>\n<p><time title=\"2023-04-18T18:26:44+00:00\" datetime=\"2023-04-18T18:26:44+00:00\">April 18, 2023 11:26 AM<\/time>\n\t\t\t<\/p>\n<\/section>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"567\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2014\/08\/cybersecurity.jpg?fit=750%2C567&#038;strip=all\" alt><\/p>\n<div>\n<p><em>Image Credit: ra2studio \/ Shutterstock<\/em><\/p>\n<\/div><\/div>\n<\/p><\/div>\n<div id=\"primary\" role=\"main\">\n<article id=\"post-2870477\">\n<div>\n<div id=\"boilerplate_2682874\">\n<p><em>Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success<\/em>. <em><a href=\"https:\/\/avolio.swapcard.com\/Transform2023\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=landingpage&#038;utm_campaign=T23_BoilerPlates\">Learn More<\/a><\/em><\/p>\n<hr>\n<\/div>\n<p>Today, <a href=\"https:\/\/www.paloaltonetworks.com\/\">Palo Alto <\/a><a href=\"https:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Networks<\/a> released the <a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\">Unit 42 Cloud <\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat<\/a><a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-expanding-attack-surface\/\"> Report Volume 7<\/a>, which examined over 1,300 organizations and analyzed the workloads in 210,000 cloud accounts, subscriptions and projects across CSPs. The analysis found that <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\">security<\/a> teams take an average of 145 hours \u2014 approximately six days \u2014 to resolve a single security alert.\u00a0<\/p>\n<p>The research indicates that most security teams aren\u2019t able to process alerts at the speed they need to protect their organizations against threat actors.\u00a0<\/p>\n<p>\u201cOrganizations need to be as fast as the attackers they\u2019re defending against. Typically, Unit 42 sees attackers exploiting newly disclosed vulnerabilities within a few hours \u2014 if not minutes. Resolving security alerts with speed and urgency is critical for organizations, and there\u2019s technology that if configured properly, will help cut down the alert noise as well,\u201d said Jay Chen, cloud security researcher, Prisma Cloud and Unit 42 at Palo Alto Networks.\u00a0<\/p>\n<p>In any case, the report highlights that many security teams are making the same mistakes, which are leading to alert generation. For instance, 80% of alerts are triggered by just 5% of security rules in most organizations\u2019 cloud environments.<\/p>\n<p><html><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Transform 2023<\/span><\/p>\n<div id=\"gm0a52976\">\n<p>Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.<\/p>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/Transform2023\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=landingpage&#038;utm_campaign=T23_incontent\"><br \/>\n                Register Now            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<h2 id=\"h-lack-of-mfa-a-common-security-weakness\">Lack of MFA a common security weakness<\/h2>\n<p>The report also revealed that most organizations were failing to enforce multifactor authentication (<a href=\"https:\/\/venturebeat.com\/security\/multifactor-authentication-keeping-employee-data-secure-through-digital-id-management\/\">MFA<\/a>) among cloud users, with 76% of enterprises not implementing MFA for users who can log in to the cloud management web portal on the public internet and 58% not enforcing MFA for root\/admin users.\u00a0<\/p>\n<p>This is a serious oversight given that if any of these privileged identities were accessed by an attacker, the entire cloud infrastructure would be at risk of compromise.<\/p>\n<p>Above all, the Palo Alto Networks research suggests that organizations need to enhance user access controls in the cloud and find new ways to streamline alert resolution to survive in the current threat landscape.<\/p>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html?utm_source=VBsite&#038;utm_medium=bottomBoilerplate\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<p>\t\t\t\t<\/html><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/report-security-teams-take-an-average-of-6-days-to-resolve-alerts\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Tim Keary<\/p>\n","protected":false},"excerpt":{"rendered":"<p>April 18, 2023 11:26 AM Image Credit: ra2studio \/ Shutterstock Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Today, Palo Alto Networks released the Unit 42 Cloud Threat Report Volume 7, which examined over 1,300 organizations and analyzed the workloads<\/p>\n","protected":false},"author":1,"featured_media":631076,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[193,20,46],"tags":[],"class_list":{"0":"post-631075","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-report","8":"category-security","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/631075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=631075"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/631075\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/631076"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=631075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=631075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=631075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}