A surprising thing happened when organizations around the world got serious about protecting themselves, their data and their customers from sophisticated cyberthreats: They developed new, dynamic approaches to cybersecurity that fueled IT innovation and extended beyond the security realm to make enterprises more effective and competitive.

On second thought, perhaps this outcome is not so surprising. The demands of security are driving IT innovation and forcing analysts to get creative. And when you let creativity loose, it rarely confines itself to only one field.

Collaboration and Trust Promote IT Innovation

According to CIO Insight, cybersecurity threats have encouraged organizations to fight back with a variety of strategies and tactics. PwC further examined some of these methods in its report, “The Global State of Information Security Survey 2017.” Some approaches that drew widespread support include running IT functions in the cloud, calling on managed security services (MSS), biometric authentication, wider use of open source software, big data analytics for security and investing in security for the Internet of Things (IoT), the report showed.

The migration of IT functions to MSS and cloud reflect broader trends in industry. In the most immediate sense, enterprises turn to managed security services because trained specialists are in short supply. This is also a driver for cloud-based IT.

But the cloud and managed services options rely fundamentally on trust and collaboration between vendors and customers. The fact that these relationships are now reliable, even in a domain as sensitive as cybersecurity, testifies to a growing web of trust and confidence upon which all organizations can draw.

Security Leads the Way Into a Dynamic Future

The rate of cloud adoption varies by business unit. A broad 63 percent of survey respondents reported running IT functions in the cloud. In contrast, cloud adoption for operations, customer service, marketing and finance departments all ranged between 36 and 32 percent. In short, the IT community is leading the way to the cloud.

Meanwhile, 62 percent of respondents reporting using MSS for cybersecurity and privacy, nearly identical to the rate of cloud use. Since the security and IT communities are closely linked, it’s no wonder parties within the two industries are eager to form partnerships.

Authentication is the one most widely used managed security services, the study revealed, with 64 percent adoption. Data loss prevention, identity and access management (IAM), and real-time monitoring and analytics follow fairly closely behind at rates between 55 and 61 percent. Threat intelligence lags somewhat behind at 48 percent, likely due to the very high level of sophistication and collaboration it requires. This represents the cutting edge of security,.

In short, organizations can address challenges and opportunities extending far beyond cybersecurity itself by pursuing innovative approaches to security.

More from Security Services

How I got started: SIEM engineer

2 min read - As careers in cybersecurity become increasingly more specialized, Security Information and Event Management (SIEM) engineers are playing a more prominent role. These professionals are like forensic specialists but are also on the front lines protecting sensitive information from the relentless onslaught of cyber threats. SIEM engineers meticulously monitor, analyze and manage security events and incidents within an organization. They leverage SIEM tools to aggregate and correlate data, enabling them to detect anomalies, identify potential threats and respond swiftly to security…

How IBM secures the U.S. Open

2 min read - More than 15 million tennis fans around the world visited the US Open app and website this year, checking scores, poring over statistics and watching highlights from hundreds of matches over the two weeks of the tournament. To help develop this world-class digital experience, IBM Consulting worked closely with the USTA, developing powerful generative AI models that transform tennis data into insights and original content. Using IBM watsonx, a next-generation AI and data platform, the team built and managed the entire…

Machine learning operations can revolutionize cybersecurity

4 min read - Machine learning operations (MLOps) refers to the practices and tools employed to streamline the deployment, management and monitoring of machine learning models in production environments. While MLOps is commonly associated with data science and machine learning workflows, its integration with cybersecurity brings new capabilities to detect and respond to threats in real-time. It involves streamlining the deployment and management of machine learning models, enabling organizations to gain insight from vast amounts of data and improve their overall security posture. Defining…

Zero-day attacks are on the rise. Can patches keep up?

4 min read - That latest cyberattack threatening your organization is likely coming from outside the corporate network. According to Mandiant’s M-Trends 2023 report, 63% of breaches came from an outside entity — a considerable rise from 47% the year before. When it comes to how intruders are getting into the network, it depends on the organization’s location. Spearphishing is the top attack vector in Europe, while credential theft-based attacks are the number one type of attack in Asia, Kevin Mandia, Mandiant CEO, told…