Saturday, December 2, 2023

Our mission is to provide unbiased product reviews and timely reporting of technological advancements. Covering all latest reviews and advances in the technology industry, our editorial team strives to make every click count. We aim to provide fair and unbiased information about the latest technological advances.

Security officer guarding virtual server room

Image Credit: Colin Anderson Productions pty ltd/Getty

Check out all the on-demand sessions from the Intelligent Security Summit here.

There is an epidemic of security breaches all around. Just last month, in the span of one week, a hacker gained access to the personal information of American Airlines customers, yet the company reported record revenue of $13.4 billion in Q2; Uber took its internal comms and engineering systems offline following a network compromise but noted a Q2 revenue of $2.7 billion; even video game studio Rockstar Games was compromised when a bad actor stole in-development footage and data from the unreleased next installment of its billion-dollar Grand Theft Auto game.

Cyber adversaries can remain undetected for an average of 201 days. That’s just over six months. It’s a shockingly small amount of time for some of the top companies worldwide to assume they’re safe from bad actors. At the same time, the VC industry doled out a massive $17.1 billion to power the growth and sophistication of existing cybersecurity vendors and fund new disruptors, while attacks are increasing in number and cost. For the twelfth year in a row, the U.S. holds the title for the highest cost of a data breach, with an average amount of nearly $9.5 million per incident. 

With rapid digitalization increasing over the past decade, it’s almost absurd to think that with all the time and money invested in cybersecurity, there hasn’t been a legitimate breakthrough. Why aren’t these enterprise giants that have funds and access to top-notch cybersecurity systems and top talent unable to avoid massive breaches and contain the massive damage to their products, services, and customers? The conclusion is easy when you realize it. They aren’t finding the adversary because they aren’t looking for it intentionally and continuously.  

See also  Apple Supplier Starts AirPods Production in India For Export: Report

How did it get to this point?

The cybersecurity outlook is disappointing, and its current state of regular compromise and uncertainty can be traced to a handful of factors.  


Intelligent Security Summit On-Demand

Learn the critical role of AI & ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.

Watch Here

For one, threats are constantly evolving. Whenever cybersecurity teams pinpoint a solution to one threat, a dozen or more could have popped up in its place. It’s the current nature of cybersecurity teams to be reactive. But that perpetuates an ineffective cycle of being unable to think ahead. Bad actors scan networks and develop attacks before defenders can even detect and patch such system breaks. Solutions are obsolete the moment they’re deployed.  

Additionally, as defense architectures have become increasingly funded and grown in complexity, they lack true accountability to test whether they’re effective. Intricate tech and ballooning costs created false safety — these solutions cost so much and they take specialized experts to deploy, so it must be working, goes the line of thinking. We also just have to accept that investment in cybersecurity does not equal actual protection. Instead, vendors simply deliver without dynamic monitoring capabilities and leave incremental protection that doesn’t scale.  

Large enterprises also need to break free of the “it won’t happen to me” mentality. Obviously, given the numbers, it will happen at some point. Even with the best cybersecurity systems and top talent in place, companies are still vulnerable to dangerous threats and crippling cyber-attacks. That said, there are tangible ways to contain adversaries so that companies aren’t constantly underperforming from a protection point of view.   

See also  Giants of e-commerce in Africa: The case of Jumia

Create continuous cybersecurity assessment

There must be a bigger focus on creating or adopting capabilities that disrupt the current complacency in cybersecurity. Don’t think about keeping adversaries out of networks — assume that they’ve already inside. It’s a scary hypothetical that isn’t hypothetical at all. Chances are the bad actors are actually in networks as you’re reading this. But it’s a secret advantage. Companies can’t overlook the power of their own network data.  

By establishing a factual, internal network-focused process of continuous compromise assessment, companies can create a sense of certainty around cyber-attacks. 

  • Detection: Companies should already automate proactive threat detection and prevention capabilities to be able to sift through the unreasonably high number of false alerts that internal network behaviors produce, while also flagging the compromises that could already be there. 
  • Response: A normal reaction when teams identify a cyber-attack is panic. The best response is to know the next steps once a viable threat is flagged. Incident responses through automated tools give users step-by-step details to mitigate the spread of further attacks. 
  • Integration: The problem then evolves into how to collect signals of network traffic and viable threats in a way that accurately repels the attack. Solutions must be open source enough to connect any tool in an existing security stack along with the ability to add additional integrations for ever-evolving threats. 
  • Correlation: After credible threats are dealt with, data should be stored and reanalyzed to improve resilience over time. This way, metadata can be scrutinized repeatedly over new intelligence as new threats arise. It goes without saying that the data should be stored correctly so that the needed information can be easily and safely retrieved.  
See also  TikTok is stealing the show from some Internet Giants!

There can be no one-size-fits-all silver bullet solution to mitigate attacks. But continuous compromise assessment simplifies the decision-making process for team leaders and changes the dynamics of a company’s cybersecurity ecosystem.

The reality is that bad actors won’t go away. What can go away are the ineffective responses to an organization’s cyber threats. Creating constant visibility into the nature of compromises is step one in an effective cybersecurity strategy. 

Ricardo Villadiego is CEO and founder of cybersecurity firm Lumu. 


Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even consider contributing an article of your own!

Read More From DataDecisionMakers

…. to be continued
Read the Original Article
Copyright for syndicated content belongs to the linked Source : VentureBeat –


Denial of responsibility! is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.





December 2023

Why enterprise giants can’t escape cybersecurity breaches- Why enterprise giants can’t escape cybersecurity breaches * Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | Why enterprise giants can’t escape cybersecurity breaches | | Why enterprise giants can’t escape cybersecurity breaches | | Why enterprise giants can’t escape cybersecurity breaches | | Why enterprise giants can’t escape cybersecurity breaches |