Posts

Showing posts from April, 2022

Cybersecurity Infrastructure Needs a New Model

Image
  Cybersecurity  systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled  cybersecurity analysts  who can evaluate that data (and they are very expensive if you can find them). Finally, and hackers are getting smarter and more creative all the time. AI was supposed to be the cure for these issues, but it has been of limited use in addressing the problem at scale because it requires large, thoughtfully-planned infrastructure. In this article, we’ll look at the role of  AI in cybersecurity  systems and how it can become a truly transformative technology. AI as Snake Oil AI is mentioned a lot in marketing literature describing  cybersecurity solutions , but so far, it hasn’t been as transformative as you might think. Despite a market size that grows at a  20.5 percent compound annual growth rate , AI still remain...

Going SOCless

Image
  According to the FBI, the number of  cyberattacks  reported to their Cyber Division is up 400 percent compared to  pre-pandemic levels , and attacks are getting worse. From financial sites to healthcare sites to government sites to supply chain industries, no one is safe from these attacks. The traditional defense against these threats is the  Security Operations Center (SOC)  – a room full of analysts watching for security alerts on TV screens – but this defense isn’t working very well – just ask the  cybersecurity  teams at Continental Pipeline, Target, TransUnion or any of hundreds of other companies that have experienced significant attacks. How a SOC Works, and Doesn’t Work The operating theory behind a  SOC  is that if you collect enough data across the enterprise through various  IT and   security tools , then use analysis platforms to rank and visualize the alerts from different tools, then finally deploy a tiered ana...