Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/14/2021
11:20 AM
Joan Goodchild
Joan Goodchild
Quick Hits
50%
50%

SOC Teams Burdened by Alert Fatigue Explore XDR

ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately

Cybersecurity analytics and operations is more difficult today than it was 2 years ago, according to a recent survey of security professionals conducted by Enterprise Strategy Group (ESG).

The research finds some of the top reasons why security teams struggle more now include:

  • The threat landscape is evolving and changing rapidly: 41%
  • We collect and process more security data than we did two years ago: 35%
  • The volume of security alerts has increased over the past two years: 34%
  • The attack surface has grown over the past two years: 30%

As the attack surface and threat landscape grow more complex, security teams say alerts in the security operations center (SOC), generated from many disparate security controls, have also become complicated and difficult to monitor.

Survey respondents listed their top three challenges with alerts as:

  • Filtering the nose out of alerts so we can focus on the right signals: 38%
  • Scaling to collect, process, and analyze the growing volume of security data: 37%
  • Collecting, processing, and contextualizing threat intelligence data: 36%

Many organizations are exploring extended detection and response (XDR) to help detect complex attacks. XDR is an integrated suite of security products spanning hybrid IT architectures designed to coordinate on threat prevention, detection, and response. The tech is meant to unify control points, security telemetry, analytics, and operations into one enterprise system.

ESG reports those who are interested in XDR find the following capabilities most appealing:

  • Simplified visualization of complex attacks and understanding how they progress across a kill chain: 42%
  • Advanced analytics that can detect and identify modern, sophisticated attacks: 38%

Dave Gruber, senior analyst with ESG, examines the XDR market and the technology's potential in SOCs in a recent Dark Reading webinar Making XDR Work in Your Enterprise.

The webinar's discussion centers on how XDR applies to real-life environments and scenarios, and how it works with, and independently from, other tools. It also touches on common challenges with deployment of XDR solutions.

The webinar can be accessed here.

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.