Network Security

Practitioners sound alarm: Cloud complexity and skills gaps undermining security posture

(Adobe Stock)

The 2025 State of Cyber Security report from Check Point underscores a mounting concern across the security community: The complexity of modern cloud environments is overwhelming security teams. As organizations adopt multi-cloud strategies, integrate edge computing, and deploy interconnected SaaS applications, visibility and control are breaking down.

Attackers are taking advantage of this sprawl. From misconfigured APIs to under-protected containers, gaps in coverage allow threat actors to move laterally across hybrid networks. Traditional tools and segmented defenses can’t keep up with the rapid, dynamic nature of these environments.

Hybrid attacks exploit fragmented defenses

A rising tactic among attackers is the use of hybrid campaigns that bridge on-prem and cloud-based infrastructure. These operations are designed to evade detection by leveraging inconsistencies in security coverage.

For instance, attackers often exploit overlooked on-prem credentials or edge device vulnerabilities to gain a foothold, then pivot into cloud environments where centralized logging or identity policies may be lacking. Without a unified approach to security, even well-resourced organizations can find themselves vulnerable to these cross-domain threats.

Skills shortages hamper response and resilience

While technical complexity is a major hurdle, the skills gap is just as dangerous. The report finds that many security practitioners are undertrained or overwhelmed, juggling an expanding array of responsibilities with limited support.

As cloud-native services evolve, traditional security expertise no longer guarantees readiness. Misconfigurations, blind spots in DevOps pipelines, and unmanaged third-party integrations often trace back to insufficient training or a lack of specialized cloud security knowledge.

Rising threat volume adds pressure

The skill and resource gaps are coming to a head as threat activity accelerates. Infostealer attacks rose by 58% in the last year, often targeting cloud credentials and session cookies. Supply chain attacks are also becoming more frequent, with attackers exploiting open-source code repositories, unsecured APIs, and cloud storage missteps.

Incident response teams are particularly strained. The report highlights confusion over roles, ineffective tooling, and slow detection as persistent challenges—issues that are magnified in complex, hybrid environments.

What needs to change?

Check Point researchers call for organizations to consolidate platforms, automate where possible, and prioritize cloud-native security capabilities. These approaches can help reduce manual configuration errors and eliminate the fragmented view of security that hampers many teams.

Equally important is workforce development. Upskilling current employees, building stronger DevSecOps pipelines, and aligning teams under a unified operational model are critical for long-term resilience.

Conclusion

The message is clear: Cyber risk in 2025 is no longer just about facing smarter attackers—it’s about fixing internal misalignments that leave organizations exposed. Without simplifying infrastructure and bridging the talent gap, even the most advanced defenses may fall short.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.
Bill Brenner

InfoSec content strategist, researcher, director, tech writer, blogger and community builder. Senior Vice President of Audience Content Strategy at CyberRisk Alliance.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds