Tuesday, April 13, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

Reducing Complexity by Increasing Consolidation for SMEs

November 13, 2020
in Internet Privacy
Reducing Complexity by Increasing Consolidation for SMEs
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Complexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set of cyber threats is leading to runaway costs, staff inefficiencies, and suboptimal threat response. Small to medium-sized enterprises (SMEs) with limited budgets and staff are significantly impacted.

On average, SMEs manage more than a dozen different security tools, making it very difficult for security teams to manage and orchestrate. SMEs are, understandably, looking to consolidate their security tools to make cybersecurity more manageable and cost-effective.

You might also like

BRATA Malware Poses as Android Security Scanners on Google Play Store

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data

What Does It Take To Be a Cybersecurity Researcher?

The challenge for these companies is to figure out how to consolidate cybersecurity tools without losing needed protections safely. An upcoming webinar is set to help SMEs with this very issue (sign up here).

The Cybersecurity Complexity Problem Cannot Be Overemphasized

Over the past decade (at least), CISOs have continuously lobbied for increased cybersecurity budgets to acquire more and more “essential” tools.

With an unremitting barrage of cyber threats continuously tweaked and reimagined to bypass existing defenses, adding new technologies designed to thwart the new attack techniques seemed warranted.

As they say, however, sometimes the cure is worse than the disease. As a result of this tool sprawl caused by the cyber-arms race, SMEs today are faced with:

  • Too Many Cybersecurity Tools – Maintaining, updating, integrating, and ultimately utilizing a growing set of complex tools that are typically not designed to work with each other is challenging.

Properly integrating multiple tools, so security practitioners aren’t forced to move between panes of glass constantly is expensive and complex – think SIEM and SOAR tools, which are typically out of reach for SMEs.

Not only is it expensive and complex to integrate the cybersecurity stack into these tools, but they then have to be continuously cared for and add additional tools to the mix, which counteracts the desire for consolidation.

Another issue facing SMEs is that not every tool turns out to be as useful or usable as expected. Or, some tools have simply reached the end of life but are maintained because they do provide some value. Perhaps reshuffling the “tool deck” could help weed out less useful tools while adding fewer yet far more useful tools.

  • Too Many Vendors – As if managing the tools weren’t enough, dealing with an expanding set of vendors adds another source of headaches for SME CISOs. Some vendors are overbearing, some are unreachable, and a few are actually helpful. And trying to get security technology companies to collaborate has never been any CISOs idea of a good time.
  • Too Few Security Practitioners – More threat variations and more tools to manage means more headcount is required. However, headcount expansion concomitant with technology expansion is the exception vs. the rule so existing security staffs become overburdened with additional tools. The tools are supposed to make security practitioners’ lives easier and often do, but carry the burden of additional and separate tools to learn and care for.
  • Too Small of an ROI – Perhaps the most egregious outcome of too sprawl is that many organizations are getting too little return on their sizable investments. Lots of under-integrated, specialized tools with too few security professionals to leverage the technology means improvements to the enterprise’s security posture are often incremental and not worth the price paid. The corollary is that retargeting the investment into the proper set of tools will result in more noticeable improvements.

Consolidating the Security Stack without Compromising Protection

This is the question. Perhaps newer security technologies, designed to solve multiple problems, can be used to supplant older, siloed, specialized technologies. Some of these older technologies were brought in as a stopgap for a specific threat, which may or may not still exist and may or may not is addressed by broader technology solutions. This is one of the suggestions to be provided in the upcoming webinar. Register here.


Credit: The Hacker News By: noreply@blogger.com (The Hacker News)

Previous Post

Internet of Medical Things is Beginning to Transform Healthcare 

Next Post

Info of 27.7 million Texas drivers exposed in Vertafore data breach

Related Posts

BRATA Malware Poses as Android Security Scanners on Google Play Store
Internet Privacy

BRATA Malware Poses as Android Security Scanners on Google Play Store

April 13, 2021
Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data
Internet Privacy

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data

April 13, 2021
What Does It Take To Be a Cybersecurity Researcher?
Internet Privacy

What Does It Take To Be a Cybersecurity Researcher?

April 12, 2021
Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021
Internet Privacy

Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021

April 12, 2021
Hackers Tampered With APKPure Store to Distribute Malware Apps
Internet Privacy

Hackers Tampered With APKPure Store to Distribute Malware Apps

April 10, 2021
Next Post
Info of 27.7 million Texas drivers exposed in Vertafore data breach

Info of 27.7 million Texas drivers exposed in Vertafore data breach

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

These new vulnerabilities put millions of IoT devices at risk, so patch now
Internet Security

These new vulnerabilities put millions of IoT devices at risk, so patch now

April 13, 2021
BRATA Malware Poses as Android Security Scanners on Google Play Store
Internet Privacy

BRATA Malware Poses as Android Security Scanners on Google Play Store

April 13, 2021
6 Limitations of Desktop System That QuickBooks Hosting Helps Overcome
Data Science

6 Limitations of Desktop System That QuickBooks Hosting Helps Overcome

April 13, 2021
ANZ Bank: We’ve been using machine learning for 20 years
Machine Learning

ANZ Bank: We’ve been using machine learning for 20 years

April 13, 2021
Apple looking to close the gap between web and app privacy
Internet Security

Who do I pay to get the ‘phone’ removed from my iPhone?

April 13, 2021
Robust Artificial Intelligence of Document Attestation to Ensure Identity Theft
Data Science

Robust Artificial Intelligence of Document Attestation to Ensure Identity Theft

April 13, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • These new vulnerabilities put millions of IoT devices at risk, so patch now April 13, 2021
  • BRATA Malware Poses as Android Security Scanners on Google Play Store April 13, 2021
  • 6 Limitations of Desktop System That QuickBooks Hosting Helps Overcome April 13, 2021
  • ANZ Bank: We’ve been using machine learning for 20 years April 13, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates