December 27, 2017 By Douglas Bonderud 2 min read

Security staff are spending too much time on tasks that can be better handled by software. As noted by ZDNet, IT decision-makers estimate that employees waste three hours per day dealing with issues from application feature gaps, and security admins see that waste reach 10 hours per week, according to a recent study commissioned by LogRhythm. The result? Teams can’t work as quickly as they’d like.

In a landscape driven by emerging threat vectors and insider threats, speed underpins great security response. How can software systems keep pace with security expectations?

Teams Need More Than Traditional Software

Here’s the hard truth: Software alone isn’t enough to defend against evolving attack methods. As IT Pro pointed out, firmware-based infections are becoming more common as cyberattackers realize the value of BIOS or flash RAM persistence, making it nearly impossible for standard security methods to fight back.

But this is where software systems see the most use: as antivirus and antimalware defenses that are naturally handicapped by their own architecture. Meanwhile, security staff fall behind on identifying, cataloging and combating new threats thanks to these software limitations.

The solution may lie in shifting the focus of software. Instead of putting applications in charge of threat detection and shortchanging security professionals on features they need to get their job done, enterprises should consider swapping roles to improve outcomes on both ends.

Tapping Into AI

Fifteen years ago, the software-defined movement was just getting off the ground. Advocates suggested a world where network devices and decision-making processes weren’t fundamentally linked, in turn opening the door for less expensive, off-the-shelf hardware. It sounded great, but companies quickly realized that shifting the decision-making process off-site wasn’t quite so easy. And with the rise of IoT devices prompting a secondary slide in software security, it’s no surprise that security professionals aren’t exactly keen on giving software more control.

The evolution of processing power and software sophistication suggests another option for security teams: artificial intelligence (AI). While less than half of survey respondents reported using AI, research from Gartner suggested the potential for a 6.2 billion-hour recoup if businesses can effectively implement AI solutions.

At a basic level, this means assigning AI-controlled processes repetitive and mundane tasks that are prone to human error and require significant time investment. The next step is using artificially intelligent software with decision-making capabilities that complement, rather than compete with, human insight to create a kind of security symbiosis greater than the sum of its parts.

Staff and administrators are wasting time on tasks that can be better handled by software. Software-defined security is effectively a nonstarter (at least for now), but there’s a new kid on the block: AI. Leveraged for automation and empowered for insight, AI could be the speed boost enterprise security needs to stay on track.

More from

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

CISA releases landmark cyber incident reporting proposal

2 min read - Due to ongoing cyberattacks and threats, critical infrastructure organizations have been on high alert. Now, the Cybersecurity and Infrastructure Security Agency (CISA) has introduced a draft of landmark regulation outlining how organizations will be required to report cyber incidents to the federal government. The 447-page Notice of Proposed Rulemaking (NPRM) has been released and is open for public feedback through the Federal Register. CISA was required to develop this report by the Cyber Incident Reporting for Critical Infrastructure Act of…

Ransomware payouts hit all-time high, but that’s not the whole story

3 min read - Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities.In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies.Still, it’s not all roses for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today