March 5, 2020 By Jennifer Glenn 3 min read

If you ask any business leader what their goals are for 2020, at some level you’re likely to hear “innovation.” Innovation is essential for competing in the global economy because it helps businesses stay relevant and teams work more efficiently. This need for constant improvement is incredibly clear in the security industry, where both businesses and individuals seem to be responding to a constant stream of evolving attacks, compromises and credential theft.

Threat actors are masters of innovation. With every new defense that your business introduces, these actors come up with another vector or approach to circumvent it. In nearly two decades working in the security space, I’ve seen many, many new products introduced, each designed to help address the latest attacks. And still, attackers are successful. It’s mind-boggling. It’s frustrating.

Both threat actors and defenders have access to the same tools and techniques. They learn about them at roughly the same pace. So how are cybercriminals able to evolve their attack techniques so quickly? How are they able to maintain such a tight arms race with threat defenders?

I’m sure there is more than one answer to this question. However, one thing that threat actors seem to do better than defenders is quite simple: They collaborate. They actively work together on new attack code, improving techniques and sharing best practices. This is one area where we in the security industry can change our approach.

Taking a Cue From Our Adversaries

The multicloud enterprise is creating a significant challenge for security teams. As the business grows and changes by the minute, security vulnerabilities increase. And, as highlighted above, security teams are bombarded with new products and tools that are designed to address each new vulnerability, attack method and compromise. A study conducted by Forrester Consulting found that, on average, 52 percent of security products and 77 percent of vendors have been added within the last two years.

However, the challenge with these products is that they are designed to function individually. This closed, proprietary approach is fairly common for security tools, and the reasons for this vary by product or company. For some, there isn’t a clear incentive to work collaboratively with other tools. There may be competitive concerns, or perhaps the reason is simply that the APIs or standards don’t exist or work well. Whatever the reason, this siloed approach is putting enterprise security teams at a disadvantage.

In order to transform, our entire industry must think differently. We can follow the example set by other major technology areas and our adversaries: leveraging open, collaborative practices to react faster, respond more intelligently and fuel innovation throughout the business.

Here are four ways to get started:

  • Take advantage of open standards — Standards developed and maintained via collaboration and consensus help create an ecosystem across cybersecurity silos. Open standards such as STIX/TAXII and OpenC2 are helping vendors to share specific security data and insights. Currently, more than 50 cybersecurity vendors have adopted or plan to adopt STIX as a standard for data interchange.
  • Use open-source code — Open-source technology is a great way to quickly solve new problems or address gaps in commercial software. Collaborating on code provides new ideas vetted by industry experts. This combination of innovation, experience and expertise can be a great way to improve the effectiveness of your security ecosystem.
  • Gain insight from shared intelligence and analytics — Vendors, as well as the community, have started building tools to better create, share, collaborate on and use cyberthreat intelligence, as well as detections and analytics. These tools and data sets provide cross-platform ways to express data since proprietary formats are often too costly for enterprises to adopt and maintain. These trends will only accelerate, as any single defender or vendor will never be able to cover the entire threat landscape.
  • Share best practices — Best practice frameworks consist of guidelines and practices to manage cybersecurity risk. The cost-effective approach helps to promote the protection and resilience of critical infrastructure.

Beware of the Free Puppy

There is a lot to be gained from leveraging an open construct in security, but there are some cautions as well. For example, one of the biggest myths surrounding open source is that it’s free. While there may be no cost associated with a piece of code, it’s free like a puppy is free. Without proper care and investment, you can’t expect great results.

Open source projects require time, management and contribution in order to produce relevant and secure products. What’s more, these projects require constant input and improvement that only an expert community can provide. This creates a distributed trust model that strengthens the foundation of open projects.

Join the Movement for Open Security

Reimagining security as an open construct is the catalyst to reshaping our industry. An open framework is essential for helping enterprises accelerate innovation and making security teams more effective at fighting cybercriminals and threats.

Learn more about driving security into the fabric of your business

More from Cloud Security

Cloud security evolution: Years of progress and challenges

7 min read - Over a decade since its advent, cloud computing continues to enable organizational agility through scalability, efficiency and resilience. As clients shift from early experiments to strategic workloads, persistent security gaps demand urgent attention even as providers expand infrastructure safeguards.The prevalence of cloud-native services has grown exponentially over the past decade, with cloud providers consistently introducing a multitude of new services at an impressive pace. Now, the contemporary cloud environment is not only larger but also more diverse. Unfortunately, that size…

The compelling need for cloud-native data protection

4 min read - Cloud environments were frequent targets for cyber attackers in 2023. Eighty-two percent of breaches that involved data stored in the cloud were in public, private or multi-cloud environments. Attackers gained the most access to multi-cloud environments, with 39% of breaches spanning multi-cloud environments because of the more complicated security issues. The cost of these cloud breaches totaled $4.75 million, higher than the average cost of $4.45 million for all data breaches.The reason for this high cost is not only the…

Accelerating security outcomes with a cloud-native SIEM

5 min read - As organizations modernize their IT infrastructure and increase adoption of cloud services, security teams face new challenges in terms of staffing, budgets and technologies. To keep pace, security programs must evolve to secure modern IT environments against fast-evolving threats with constrained resources. This will require rethinking traditional security strategies and focusing investments on capabilities like cloud security, AI-powered defense and skills development. The path forward calls on security teams to be agile, innovative and strategic amidst the changes in technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today