Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/13/2018
10:25 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

One in Three Businesses Use Outdated Cybersecurity Tools to Address Next-Gen Threats

New research from Cyber adAPT and Ovum reveals that despite increased spending and frequency of threats, businesses are not fully equipped to face growing threat landscape.

February 7th 2018 – Dallas, Texas – A new report released today, commissioned by Cyber adAPT and conducted by Ovum, reveals that nearly a third (31%) of security teams depend solely on outdated tools such as basic search and monitoring for their cyber security needs.

The report, Business has a crucial need for continuous threat visibility and cyber security management services, collates insight from more than 6,000 senior business respondents, as well as in-depth interviews with CISOs, and demonstrates that cyber security spending is increasing at a rate of between 9%-12% each year.

Despite the rise in investment, the volume of attacks continues to skyrocket, with data breach incidents increasing by 40%. The report states that the amount of data lost has grown to unsustainable levels, with 1.9 billion records lost or stolen during the first half of 2017 – more data loss than 2016 as a whole.

This industry is however showing positive signals, with over two-thirds (69%) of security teams switching to a more evolved, analytical approach to defense. These include advanced security information and event management (SIEM), next-generation artificial intelligence (AI), machine learning (ML), and network analytics.

Kirsten Bay, President and CEO of Cyber adAPT, comments: “New generation technologies offer an exciting future for the cyber security industry. Many CISOs are struggling to persuade their boards to invest in new solutions, having failed to demonstrate the returns delivered by outdated tools – in fact, almost 60% of respondents thought they received poor value from their existing investments.”

For organizations not yet utilizing next generation analytics, over half (57%) of teams said they were not ready as the tools would be too difficult to integrate based on the internal skills and resources they draw upon.

Bay continues: “A platform approach, bolstered by AI and machine learning is set to offer real returns for cyber security customers. Technology will no longer rely on human input to detect threats and will prioritize alerts to streamline the CISOs workload, reducing the amount of time a threat is active inside a network.”

Half of organizations (50%) highlighted false positives as something they could not afford to waste time dealing with. Managed Security Services Providers (MSSPs) deliver prioritized threat data offering the potential to save time, 80% of CISOs stated they were prepared to work with a MSSP, and the report predicts this sector will account for more than 20% of total security market share by 2020.

Andrew Kellett, Principal Analyst, Infrastructure Solutions at Ovum, comments: “With an evolving threat landscape, CISOs are battling to equip organizations to improve security and data protection. The lack of available resources within internal teams creates a vulnerability that technology must address. Prioritizing risk must be the focus to ensure effective returns on cyber security investment and safeguard network infrastructures.”

A full copy of the report can be downloaded at: cyberadapt.com/Ovum

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19040
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
CVE-2019-19041
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.