Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Why Security & Profitability Go Hand-In-Hand
Threaded  |  Newest First  |  Oldest First
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/22/2014 | 9:19:20 AM
Why Security & Profitability Go Hand-In-Hand
Hard to justify security in an organization from a profitability perspective. It is definitely a necessary evil but unless you have been affected directly by breaches or such it does not mean much.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/22/2014 | 4:12:22 PM
Re: Why Security & Profitability Go Hand-In-Hand
It is hard to justify, but in the wake of recent events, you would think that the case is a little easier to make. The structural issue, is one that seems really out of whack with today's reality -- with the IT teams broken into application, server, infrastructure, desktop  -- none of which is directly responsible for security. 


Do you find that consistent in organizations you've worked in or that of your colleagues
Bprince
50%
50%
Bprince,
User Rank: Ninja
5/28/2014 | 9:23:47 PM
Ultimately though...
I agree with Randy. Once you get beyond regulatory compliance requirements, it is easy for security to be viewed a lot like medical insurance - you have to have it, but you don't necessarily need the best insurance plan being offered. At least not until you are sick. I think that's just a conundrum that security pros are going to have to deal with whenever it's budget time.

BP
PaloJoel
50%
50%
PaloJoel,
User Rank: Apprentice
6/9/2014 | 7:02:16 PM
Security is a competitive advantage plain and simple
If your more secure than your competitors, if you do it more efficiently from a man power perspective, and you get a better investment yield on security technologies than your competitors its a competitive advantage to the business.


Better security controls, better efiiciencies, and better investment yield equals an advantage verse other companies who loose more data, see more breaches, have larger teams, and burn through ever increasing wads of cash.


The CEO of Target was fired not because their virtualization strategy was incomplete, or they lost a server, or the TCO and cost savings in reduced travel and better decision making through video conferencing did not compute.  It was not really even due to his job performance.  It was because they were less secure than Walmart, were not as efficient as Macys, and did not get a good return on their investment(s) like Kohls.  Presuming Walmart is safe, Macys is efficient, and Kohls see a good return.


Target was and may still be at a competitive disadvantage due to less relevant security controls, operational ineffiiencies, and poor investment yield in reducing risk from their legacy controls.


Bottomline- If i am robbed less, protect myself better, do it more easily, and spend less doing it than the other guy I am going to grow faster and be more profitable.


The real question business leaders should be asking security practioners is make my security a competitve advantage verse " how do i get you to stop draining my pockets."

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-23599
PUBLISHED: 2022-01-28
Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscree...
CVE-2022-0395
PUBLISHED: 2022-01-28
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
CVE-2022-21721
PUBLISHED: 2022-01-28
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in ...
CVE-2022-23598
PUBLISHED: 2022-01-28
laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value w...
CVE-2021-4160
PUBLISHED: 2022-01-28
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis sug...