LambdaTest announced the launch of the HyperExecute MCP Server, an enhancement to its AI-native test orchestration platform, HyperExecute.
Cloud-based business initiatives are accelerating faster than security organizations' ability to secure them, according to the State of Hybrid Cloud Security Survey from FireMon.
The survey revealed 60% of respondents either agreed or strongly agreed that this was happening in their organizations. In many cases, security personnel are not even included in cloud business initiatives.
Additional key findings include:
■ Only 56% of respondents indicated that network security, security operations or security compliance teams are responsible for cloud security.
■ In the remaining 44% of cases, IT/cloud teams, application owners or other teams outside the security organization are responsible for cloud security.
Similarly, the relationship between security and DevOps is inconsistent across organizations, which can impact the consistency of cloud security controls, as more enterprises deploy "as-a-Service" models in the cloud. In some cases, DevOps and security are fully aligned and working well together. In other cases, the relationship is difficult or even dysfunctional:
■ 39% of respondents said they are using Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) models concurrently.
■ 7% of respondents said they are part of the DevOps team, as part of the emerging DevSecOps trend.
■ However, 30% indicated their relationship with DevOps is either complicated, contentious, not worth mentioning or non-existent.
Existing Security Tools Can't Handle Scale and Complexity
The survey found that enterprises are inadvertently introducing complexity into their environments by deploying multiple solutions on-premise as well as across multiple private and public clouds. That complexity is compounded by a lack of integrated tools and training needed to holistically manage and secure hybrid cloud environments. Respondents also cited a lack of integration across tools, and lack of qualified personnel or insufficient training for using the tools, as key roadblocks to achieving cross-environment security management.
Key findings include:
■ 59% of respondents use two or more different firewalls in their environment, with 67% also using two or more public cloud platforms.
■ More than 80% of respondents are challenged with the limitations and complexity of security tools used for managing security across hybrid cloud environments.
■ Only 28% of respondents said they were using tools that can work across multiple environments to manage network security.
■ Almost 36% indicated using native tools for each environment or manual process, which means they are managing security in a stand-alone fashion within each component of a hybrid environment.
■ 5% of respondents said their top three challenges for securing public cloud environments are: lack of visibility, lack of training and lack of control.
Mandate: Do More with Less
The transition to hybrid cloud environments has dramatically expanded the enterprise attack surface and, subsequently, the range of assets that must be secured, but security resources are not expanding at that same scale. Budget and staffing are the key resource constraints cited:
■ 5% of respondents indicated that less than 25% of their security budget was dedicated to cloud security.
■ 52% indicated they had security teams of 10 people or fewer.
The results of our survey are compelling, but not surprising. In large, complex enterprise environments, budget constraints, lack of clarity around which team is responsible for cloud security, and the absence of standards for managing security across hybrid cloud environments are impairing organizations' ability to secure their cloud business initiatives. This problem will only be solved with a new generation of security technologies and processes that fully integrate with DevOps and provide end-to-end visibility and continuous security and compliance across hybrid environments.
There is clear indication that many companies are no longer aligned to a central security policy or security doctrine that provides the necessary security guardrails across their hybrid environments. In the absence of a concise security rule book, where departments are managing their own security controls, they will do so on a best-effort basis. You can be guaranteed that this opens the door for increased risk.
If decentralized security responsibility is the future for cloud-first strategies, and we believe it is, then we must look for a way to reestablish a global security management strategy that aligns business intent, with compliance intent, with security intent. Security implementations should closely reflect a central security doctrine. Security must be a component of application deployments where both are synchronized to each other.
Industry News
Cloudflare announced Workers VPC and Workers VPC Private Link, new solutions that enable developers to build secure, global cross-cloud applications on Cloudflare Workers.
Nutrient announced a significant expansion of its cloud-based services, as well as a series of updates to its SDK products, aimed at enhancing the developer experience by allowing developers to build, scale, and innovate with less friction.
Check Point® Software Technologies Ltd.(link is external) announced that its Infinity Platform has been named the top-ranked AI-powered cyber security platform in the 2025 Miercom Assessment.
Orca Security announced the Orca Bitbucket App, a cloud-native seamless integration for scanning Bitbucket Repositories.
The Live API for Gemini models is now in Preview, enabling developers to start building and testing more robust, scalable applications with significantly higher rate limits.
Backslash Security(link is external) announced significant adoption of the Backslash App Graph, the industry’s first dynamic digital twin for application code.
SmartBear launched API Hub for Test, a new capability within the company’s API Hub, powered by Swagger.
Akamai Technologies introduced App & API Protector Hybrid.
Veracode has been granted a United States patent for its generative artificial intelligence security tool, Veracode Fix.
Zesty announced that its automated Kubernetes optimization platform, Kompass, now includes full pod scaling capabilities, with the addition of Vertical Pod Autoscaler (VPA) alongside the existing Horizontal Pod Autoscaler (HPA).
Check Point® Software Technologies Ltd.(link is external) has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report.
GitHub announced the general availability of security campaigns with Copilot Autofix to help security and developer teams rapidly reduce security debt across their entire codebase.
DX and Spotify announced a partnership to help engineering organizations achieve higher returns on investment and business impact from their Spotify Portal for Backstage implementation.
Appfire announced its launch of the Appfire Cloud Advantage Alliance.