February 6, 2017 By Rick M Robinson 2 min read

A surprising thing happened when organizations around the world got serious about protecting themselves, their data and their customers from sophisticated cyberthreats: They developed new, dynamic approaches to cybersecurity that fueled IT innovation and extended beyond the security realm to make enterprises more effective and competitive.

On second thought, perhaps this outcome is not so surprising. The demands of security are driving IT innovation and forcing analysts to get creative. And when you let creativity loose, it rarely confines itself to only one field.

Collaboration and Trust Promote IT Innovation

According to CIO Insight, cybersecurity threats have encouraged organizations to fight back with a variety of strategies and tactics. PwC further examined some of these methods in its report, “The Global State of Information Security Survey 2017.” Some approaches that drew widespread support include running IT functions in the cloud, calling on managed security services (MSS), biometric authentication, wider use of open source software, big data analytics for security and investing in security for the Internet of Things (IoT), the report showed.

The migration of IT functions to MSS and cloud reflect broader trends in industry. In the most immediate sense, enterprises turn to managed security services because trained specialists are in short supply. This is also a driver for cloud-based IT.

But the cloud and managed services options rely fundamentally on trust and collaboration between vendors and customers. The fact that these relationships are now reliable, even in a domain as sensitive as cybersecurity, testifies to a growing web of trust and confidence upon which all organizations can draw.

Security Leads the Way Into a Dynamic Future

The rate of cloud adoption varies by business unit. A broad 63 percent of survey respondents reported running IT functions in the cloud. In contrast, cloud adoption for operations, customer service, marketing and finance departments all ranged between 36 and 32 percent. In short, the IT community is leading the way to the cloud.

Meanwhile, 62 percent of respondents reporting using MSS for cybersecurity and privacy, nearly identical to the rate of cloud use. Since the security and IT communities are closely linked, it’s no wonder parties within the two industries are eager to form partnerships.

Authentication is the one most widely used managed security services, the study revealed, with 64 percent adoption. Data loss prevention, identity and access management (IAM), and real-time monitoring and analytics follow fairly closely behind at rates between 55 and 61 percent. Threat intelligence lags somewhat behind at 48 percent, likely due to the very high level of sophistication and collaboration it requires. This represents the cutting edge of security,.

In short, organizations can address challenges and opportunities extending far beyond cybersecurity itself by pursuing innovative approaches to security.

More from Security Services

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Ermac malware: The other side of the code

6 min read - When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) — in late September of 2022.To better understand the new version of Cerberus, we can attempt to shed light on the behind-the-scenes operations of the…

ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware

12 min read - As of December 2023, IBM X-Force has uncovered multiple lure documents that predominately feature the ongoing Israel-Hamas war to facilitate the delivery of the ITG05 exclusive Headlace backdoor. The newly discovered campaign is directed against targets based in at least 13 nations worldwide and leverages authentic documents created by academic, finance and diplomatic centers. ITG05’s infrastructure ensures only targets from a single specific country can receive the malware, indicating the highly targeted nature of the campaign. X-Force tracks ITG05 as…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today