We have witnessed a dramatic shift in the nature of enterprise security in the past 10 years. The individuals attacking our networks are no longer curious college students, but highly sophisticated professionals working within well-organized teams. The sheer number of vulnerabilities has remained a major challenge, while the attacks exploiting these vulnerabilities are constantly changing to circumvent security tools. We have encountered the “next big threat” seemingly every year and raced to put additional security protections and technologies in place to combat it. The end result is a complex set of disparate and dated security tools that might not be up to the task at hand. The following are five ways the infrastructures we have created may be failing us:

The Technologies in Your Environment Are Too Static

One shift that has taken place is the rapid mutation of attacks and attack techniques. As a result, many traditional, “static” security protections such as signature-based antivirus and intrusion prevention systems (IPS) have failed to keep pace. The amount of time needed to sufficiently research a new attack then write, test and deploy a signature is an overhead we can’t afford.

We need technologies that are rapidly updated and capable of stopping never-before-seen attacks. We are starting to see behavioral-based technologies emerge that are more effective and produce minimal false positives. These types of technologies should slowly replace your traditional static methods in the areas of intrusion prevention and anti-malware.

Your Infrastructure Is Poorly Integrated

In our efforts to keep up with the next big thing in security, we have created an infrastructure that consists of dozens of point solutions from many vendors. Vendor diversity can be positive for your security posture, but many of us have created a problem I refer to as “security sprawl,” where our security infrastructure has outpaced our ability to successfully integrate and use it.

It is important that we effectively integrate various technologies in our security arsenal in order to have a fighting chance of detecting multifaceted threats such as advanced persistent threats. It is also an important component to let us sufficiently manage our own security through finite resources. Organizations should look for integration points between their different security protections to make them more effective and manageable.

You Lack Actionable Intelligence and Information

Poor integration also creates another inherent issue: The data generated by the totality of our different security tools is overwhelming. Security has become a big data problem. The sheer number of events and data being generated from our firewalls, IPS sensors, etc. would require a dedicated team to have any hope of keeping up — and producing debatable results.

If you can’t understand what your security tools are telling you or what to focus on, you can’t take action. We need a way to boil all our security data down to the events that really matter. This way, we can actually take action to improve our security and make necessary adjustments and improvements. The focus here should be on creating higher-level “dashboarding” that can provide you with meaningful information.

You Can’t Measure Your Security Effectiveness

You’ve spent hundreds of thousands or even millions of dollars over the past several years beefing up your security posture. Everyone on your team has been trained and certified, and everything has been actively deployed. How effective are those tools? Has your security gotten better or worse? Which gaps do you have in your current security posture? How do you measure security effectiveness?

Unfortunately, many tools you are using may be providing you with a false sense of security. Just because a particular tool is not alerting at the moment doesn’t mean you’re not under attack. It is vital that you continue to audit your security posture both internally and externally using third-party penetration testing. This should be an ongoing process to ensure your tools and technologies are doing what you intended them to do.

Your Security Tools Do Not Support an Emergency Response Plan

The importance of a sound emergency response plan cannot be overstated. This plan should clearly outline the steps that will be taken in the event of a security breach. In addition to this plan, your security tools should support you with the right amount of data and forensics capabilities. This goes back to the idea of having actionable data. In this case, you need detailed intelligence on what happened, the data that was accessed and whether that data was exfiltrated. Even if your emergency response plan includes the help of a third party, internal tools and technologies should support your own investigation and provide your third-party vendor with a head start on the forensics and investigation it will perform for you.

As cybersecurity continues to evolve, security professionals’ approaches will require continual change to meet future challenges. This requires both short-term planning and response and long-term planning and strategic investment. Many times, this will require reinventing approaches to ensure we are prepared for threats we are encountering today as well as future threats.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today