{"id":640625,"date":"2023-04-23T09:55:47","date_gmt":"2023-04-23T14:55:47","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/04\/23\/for-recession-proof-security-spending-embrace-the-value-of-multi-layered-integrations\/"},"modified":"2023-04-23T09:55:47","modified_gmt":"2023-04-23T14:55:47","slug":"for-recession-proof-security-spending-embrace-the-value-of-multi-layered-integrations","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/04\/23\/for-recession-proof-security-spending-embrace-the-value-of-multi-layered-integrations\/","title":{"rendered":"For recession-proof security spending, embrace the value of multi-layered integrations"},"content":{"rendered":"<p>The global economic conditions of 2023 have <a href=\"https:\/\/venturebeat.com\/security\/recession-cybersecurity-landscape\/\">raised<\/a><a href=\"https:\/\/venturebeat.com\/security\/recession-cybersecurity-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\"> <\/a><a href=\"https:\/\/venturebeat.com\/security\/recession-cybersecurity-landscape\/\">the stakes<\/a> for maintaining a strong cybersecurity posture. With budgets scaled back amid layoffs and narrowing margins, the need to adopt recession-proof cybersecurity approaches has come to the forefront as <a href=\"https:\/\/venturebeat.com\/security\/better-together-offsetting-cybersecurity-labor-challenges-with-api-integrations\/\">understaffed security teams<\/a> face increasing pressure to do more with less.<\/p>\n<p>Corporate boards are starting to allocate more attention to cyber initiatives alongside a long list of other priorities amid constantly changing economic conditions. However, the increased attention hasn\u2019t exactly translated into additional funds for CISOs. Two-thirds (66%) of respondents in Mimecast\u2019s newly released <a href=\"https:\/\/www.mimecast.com\/state-of-email-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">State of Email Security Report <\/a><a href=\"https:\/\/www.mimecast.com\/state-of-email-security\/\">2023<\/a> said their organization\u2019s cyber-defense budget is less than it should be. The sentiment reinforces a similar tone from the annual report\u2019s 2022 version, which <a href=\"https:\/\/www.mimecast.com\/state-of-email-security\/download-hub\/\" target=\"_blank\" rel=\"noreferrer noopener\">found that respondents<\/a> with a reduced cyber budget were nearly united (95%) in agreeing their organization\u2019s cyber-resilience was impaired.\u00a0\u00a0<\/p>\n<p>With that in mind, the reality of our socioeconomic climate raises an interesting question pertaining to effective cyber spending: What cost-efficient security investments should organizations prioritize to ensure they can work protected and emerge from the possible downturn unscathed?\u00a0<\/p>\n<p>For CISOs across sectors, that is the million-dollar debate \u2014 and their decisions could make or break their business for years to come.<\/p>\n<div><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Transform 2023<\/span><\/p>\n<div id=\"gm0a52976\">\n<p>Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.<\/p>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/Transform2023\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=landingpage&#038;utm_campaign=T23_incontent\"><br \/>\n                Register Now            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<div>\n<p>If recent history is any indication, economic uncertainty breeds cybercrime. Take the Great Recession of 2008, when <a href=\"https:\/\/www.umb.edu\/news\/detail\/experts_predict_ways_cybercrime_might_flourish_in_a_recession\" target=\"_blank\" rel=\"noreferrer noopener\">cybercriminal activity rose by 40%<\/a> in the two years following the downturn\u2019s low point. It\u2019s important to remember that back then, modern enterprises were far less dependent on the <a href=\"https:\/\/venturebeat.com\/data-infrastructure\/5-top-trends-driving-data-infrastructure-strategies-according-to-gartner\/\">cloud-based<\/a> networks and operational technologies that are staples of today\u2019s remote work culture. The plethora of business collaboration tools like Slack and Microsoft Teams, emerging vectors of <a href=\"https:\/\/securityboulevard.com\/2023\/02\/the-essential-guide-to-securing-hybrid-workplace-environments\/\">the <\/a><a href=\"https:\/\/securityboulevard.com\/2023\/02\/the-essential-guide-to-securing-hybrid-workplace-environments\/\" target=\"_blank\" rel=\"noreferrer noopener\">hybrid<\/a><a href=\"https:\/\/securityboulevard.com\/2023\/02\/the-essential-guide-to-securing-hybrid-workplace-environments\/\"> attack surface<\/a>, didn\u2019t even exist yet.<\/p>\n<p>So, after 12-plus years of rapid digital transformation across traditional enterprise ecosystems, threat actors have an extensive range of new vulnerabilities to exploit. Coupled with a growing cybersecurity talent shortage amplified by precautionary hiring freezes, organizations should expect sharp upticks in human error, <a href=\"https:\/\/venturebeat.com\/security\/what-is-social-engineering-definition-types-attack-techniques\/\">social engineering<\/a>, <a href=\"https:\/\/venturebeat.com\/security\/the-surprising-relationship-between-bitcoin-and-ransomware-is-investigated-in-white-house-summit\/\">ransomware<\/a> and insider threats both during and after the current downturn.\u00a0<\/p>\n<\/div>\n<p>The action (or inaction) they take today will dictate their ability to weather the storm tomorrow.<\/p>\n<h2 id=\"h-not-the-time-for-experiments\">Not the time for experiments\u00a0<\/h2>\n<p>In a perfect world, a conventional approach to recession-proof cyber spending would be to invest in a robust arsenal of best-of-breed technologies that address every intricacy of <a href=\"https:\/\/www.ftc.gov\/business-guidance\/small-businesses\/cybersecurity\/nist-framework\" target=\"_blank\" rel=\"noreferrer noopener\">NIST\u2019s five-tiered cybersecurity framework<\/a>.<\/p>\n<p>Except this situation isn\u2019t that simple. For starters, the myriad tools and technologies that comprise such an arsenal are expensive to adopt, complex to deploy and difficult for security teams to learn on the fly. <\/p>\n<p>Additionally, most enterprises lack the financial flexibility to invest in niche solutions from boutique vendors that are often high-priced and unproven. With the margin for spending error exceedingly slim, this is not the time for experimentation.<\/p>\n<p>To maximize the return on their tech stack, organizations should instead structure cyber spending around a multi-layered security architecture \u2014 investing in credible, established vendors that offer interoperable solutions within an integrated framework aligned to their unique risk profile.<\/p>\n<p>In turn, CISOs can leverage technology to optimize their people and processes, automating manual tasks and routine functions with <a href=\"https:\/\/venturebeat.com\/ai\/artificial-intelligence-ai-vs-machine-learning-ml-key-comparisons\/\">AI and machine learning<\/a> for higher levels of operational efficiency.\u00a0<\/p>\n<p>Multi-layered security architectures have a double benefit for cost efficiency: they preserve both human and financial capital. Empowering security teams to eliminate tedious workflows helps reduce constraints associated with the skills gap, burnout and tool sprawl currently afflicting the cyber workforce. Our company\u2019s independently-commissioned State of Ransomware Readiness Report <a href=\"https:\/\/securityintelligence.com\/news\/survey-shows-burnout-may-lead-to-attrition\/\" target=\"_blank\" rel=\"noreferrer noopener\">found that more than 54% of cyber professionals<\/a> believe the nature of their job has a negative effect on mental health, as their roles and responsibilities become more stressful each year. Additionally, 34% of leaders reported struggling with recruiting essential IT staff after an attack.<\/p>\n<p>Consolidating security frameworks with a deep library of API and third-party technology integrations alleviates the complexity of a bloated tech stack. Modern enterprises <a href=\"https:\/\/securityboulevard.com\/2023\/02\/the-essential-guide-to-securing-hybrid-workplace-environments\/\" target=\"_blank\" rel=\"noreferrer noopener\">leverage<\/a><a href=\"https:\/\/securityboulevard.com\/2023\/02\/the-essential-guide-to-securing-hybrid-workplace-environments\/\"> as many as 75 different tools and technologies<\/a>, yet only 28% integrate a <a href=\"https:\/\/venturebeat.com\/security\/how-external-attack-surface-management-lets-you-see-your-org-through-an-attackers-eyes\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOAR or SIEM<\/a> platform to drive defenses.<\/p>\n<p>Prioritizing consolidation reduces the burden on employees forced to master dozens of tools at a time while also eliminating the costs of unnecessary sprawl and annual renewal contracts. It creates a more agile security posture that minimizes complexity and mitigates risk without breaking the bank.\u00a0<\/p>\n<h2>Turning insights into action\u00a0<\/h2>\n<p>The operational benefits of a multi-layered security architecture are continuous and wide-ranging. By combining the core capabilities of various fundamental security tools into <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/01\/12\/why-combatting-social-engineering-attacks-requires-a-team-sport-approach\/?sh=2d9456905bb6\">a <\/a><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/01\/12\/why-combatting-social-engineering-attacks-requires-a-team-sport-approach\/?sh=2d9456905bb6\" target=\"_blank\" rel=\"noreferrer noopener\">universal line of defense<\/a>, organizations can automate the analysis of third-party telemetry data to align prevention, detection and response processes across multiple controls.<\/p>\n<p>That intelligence data is simplified into actionable insights delivered over the integrated platform in real time, generating a holistic view of the organization\u2019s end-to-end security environment through a single pane of glass. The centralized visibility serves as a guiding light for security operations center (SOC) teams to make the right moves at the right times for enhanced efficiency. For example:\u00a0<\/p>\n<h3>Use case 1: Streamlined incident response<\/h3>\n<p>Envision an SOC incident responder who was just alerted about a suspicious attachment that entered the organization\u2019s network via Microsoft Teams. Typically, they would spend hours manually investigating the potentially malicious activity, analyzing multiple siloed security sources to seek intelligence, including detonating the file, determining its origin, and identifying how many devices it had infiltrated. Rinse, wash, repeat.\u00a0<\/p>\n<p>But with a multi-layered security architecture, that elongated process is streamlined from the moment the alert is received. The analyst could use the integration\u2019s SOAR tool to automate the extraction of metadata from a corresponding collaboration security solution that first flagged the IoC.<\/p>\n<p>The SOAR runs the datasets through three additional security tools also integrated within the framework, and then creates a series of simplified directives informing the analyst on how to respond. What was once a multi-hour manual workflow comprised of tedious copying and pasting is trimmed down to about 90 seconds.<\/p>\n<h3>Use case 2: Efficient threat intelligence sharing <\/h3>\n<p>Now, envision that same security analyst who effectively remediated the incident, but is still tasked with performing damage control to prevent recurring breaches. This requires swift sharing of threat intelligence across the organization\u2019s entire security ecosystem \u2014 instructing its fellow endpoint, web, data, network and application security tools to also block the suspicious IoC should it return. Again: rinse, wash, repeat.\u00a0<\/p>\n<p>A multi-layered security architecture, however, would allow the analyst to forgo all that manual patching and updating across five different platforms. Since every system within the integrated framework is interoperable, intelligence sharing is automated across the ecosystem via customized scripts, continuous feedback loops and universal block lists. Another multi-hour manual workflow trimmed to merely minutes.<\/p>\n<h3>Use case 3: Targeted XDR capabilities<\/h3>\n<p>Finally, envision the same SOC team\u2019s threat hunters who are responsible for proactively identifying similar IoCs before they bypass protections. With siloed security tools, it\u2019s a tedious process comprised of manually sifting through hundreds of incoming alerts to determine their relevancy based on the organization\u2019s risk profile \u2014 essentially searching for a tiny needle in a massive digital haystack. Rinse, wash, repeat.\u00a0<\/p>\n<p>With a multi-layered security architecture, threat hunters can instead create customized scripts within the overarching integration library, formulating targeted <a href=\"https:\/\/venturebeat.com\/security\/zero-trust-xdr-prominent-in-gartners-hype-cycle-for-endpoint-security\/\">XDR<\/a> capabilities constructed around the organization\u2019s unique security needs and risk profile. These automated processes could, in theory, continuously flow from an email gateway\/SSE to the integrated framework\u2019s corresponding XDR system, sharing contextual intelligence on various IoCs, metadata, rich logging, malicious URLs, user activity and data movement in real time. The contextual information in turn eliminates hours of mundane work by informing threat hunters which threats to prioritize that day.<\/p>\n<h2>Doubling down on interoperability<\/h2>\n<p>The realities that come with a potential economic downturn on the horizon are clear. Even amid the current landscape, more must be done across the cyber community that positions strained SOC teams to fight back against threats and swing the balance of power away from adversaries. For organizations with reduced cyber budgets and widening skill gaps, rallying around core sets of key capabilities that are tightly integrated is imperative. A multi-layered security architecture is the bridge that can get them safely to the other side.<\/p>\n<p>While we can\u2019t always control the ripple effects of a volatile market environment, what we can control is how we respond to them. The ball is in our court \u2014 now is the time to deploy a true team-sport approach through interoperability.<\/p>\n<p><em>Joseph Tibbetts is senior director, tech alliances &#038; API at Mimecast<\/em><\/p>\n<div id=\"boilerplate_2736392\">\n<h3 id=\"h-datadecisionmakers\">DataDecisionMakers<\/h3>\n<p>Welcome to the VentureBeat community!<\/p>\n<p>DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.<\/p>\n<p>If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.<\/p>\n<p>You might even consider\u00a0<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/venturebeat.com\/contribute-to-datadecisionmakers\/\">contributing an article<\/a>\u00a0of your own!<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/venturebeat.com\/category\/DataDecisionMakers\/\" target=\"_blank\">Read More From DataDecisionMakers<\/a><\/p>\n<\/div><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/for-recession-proof-security-spending-embrace-the-value-of-multi-layered-integrations\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Joseph Tibbetts, Mimecast<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The global economic conditions of 2023 have raised the stakes for maintaining a strong cybersecurity posture. With budgets scaled back amid layoffs and narrowing margins, the need to adopt recession-proof cybersecurity approaches has come to the forefront as understaffed security teams face increasing pressure to do more with less.Corporate boards are starting to allocate more<\/p>\n","protected":false},"author":1,"featured_media":640626,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30528,20,46],"tags":[],"class_list":{"0":"post-640625","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-recession-proof","8":"category-security","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/640625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=640625"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/640625\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/640626"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=640625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=640625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=640625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}