Growing up in a small town, there wasn’t much to do. One magical day, I watched as a truck pulled up to the one restaurant in town and delivered a large crate onto the loading dock. Intrigued, I rode my bike over as the employees popped the top off a crate and revealed what was inside: a new arcade game called Missile Command.

Fast forward to several months later. By this point, I’d probably dropped enough of my parents’ hard-earned salaries into that machine to pay for a midsized car. I put everything I had into that game. Invisible bad guys would fire their missiles from above to destroy my cities at the bottom. The only thing standing between the two was me, my trusty track ball and a yellow button.

Sadly, every game eventually ended in defeat. I’d start off well, then the pace would pick up and the bad guys would change tactics to distract me. I would do my best to adjust to the information overload. Toward the end, I was just mashing the button as fast as I could and moving the track ball left to right and back again as fast as my fingers and wrist would go. If I did well, my high score would go up by some minor increment, I’d get to add my initials to the leaderboard and then I’d drop another quarter into the slot and start all over again.

Game Over for Information Overload

What in the world does this have to do with cybersecurity? Quite a bit if you think about it. In the beginning, every security practitioner gets excited when that new delivery arrives, be it a firewall, intrusion detection or prevention system, unified threat management (UTM) or security intelligence and event management (SIEM). Then, the security resource plugs it in and the activity begins.

The pace of activity is slow at first — everyone high-fives each other because things are going well and security is happening. Then the pace picks up. The alerts start coming in fast and furious. The noise in the system gets louder and louder. Security team members scramble to evaluate each alert, only to find that many were merely distractions.

The missiles keep on coming, faster and faster and faster. Eventually, the security team is overwhelmed and must switch to what is best described as a purely reactionary mode. The track ball goes back and forth, and the button gets hit over and over again.

Real-Life Security Is Not a Game

Here’s where the game and the security team tales diverge. When the game ends, you might get a high score and drop in another coin to start over. For the security team, there are no do-overs. The attacks continue and the information overload persists. The pace accelerates. The losses and impacts are real.

Security teams do the best that they can, all the while knowing that something is going to get through eventually. Adding more security technologies to protect the environment might seem like a fix, but every time a new piece of technology gets plugged in, the noise increases. But if you don’t plug in that new device, you’re not even giving yourself a chance to shoot the missiles out of the sky.

This is where IBM Security can help. Our team of security experts can help you evaluate your defenses today and use that information to deliver a plan to optimize your defenses tomorrow. Managed Security Services provide the experts and technology necessary to protect you from the onslaught. Working together, we will fight smarter to cut through the noise to focus on what really matters: keeping your environment safe.

Priming Your Digital Immune System: Cybersecurity in the Cognitive Era

More from Security Services

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Ermac malware: The other side of the code

6 min read - When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) — in late September of 2022.To better understand the new version of Cerberus, we can attempt to shed light on the behind-the-scenes operations of the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today