Half of Security Pros Ignore Some Important Alerts

  /     /     /  
Publicated : 22/11/2024   Category : security


Half of Security Pros Ignore Some Important Alerts


Short-staffed, more than half of organizations admit they ignore alerts that should be investigated because they lack resources to handle the overflow.



Strained by the cybersecurity skills shortage, 54 percent of respondents to a
new survey
say they are forced to ignore security alerts worthy of further investigation, because they dont have the staff and expertise to handle them
The Enterprise Strategy Group (ESG) surveyed 150 IT and cybersecurity pros with knowledge of, or responsibility for, enterprise security. In the
study
, released today, they discovered security operations has become a bottleneck as challenges in people, processes, and technology limit organizations ability to handle threats.
More than one-third (35%) of respondents found it tough to keep up with the volume of alerts, and nearly 30% struggled because security operations tools werent well-integrated. One-quarter say processes are too informal and rely on the skills of a handful of employees.
Theyre vulnerable in more places, explains Siemplify CEO Amos Stern, noting how the rise of tech like mobile, cloud, and IoT will complicate the problem. While their digital footprint is growing, the surface of attack is growing, and more tools are needed to detect threats.
Each of these tools focuses on a different aspect of security. Businesses that previously needed only a few security systems can now have up to 50 or 70, all of which work independently and address different functions: endpoint security, mobile, cloud, web app security.  The tools each provide a piece of the puzzle, but its still up to the security expert to decide how events are related and initiate a response.
Being alerted to more potential threats doesnt necessarily mean better security, says Stern. Half of respondents said they have to ignore alerts that need to be investigated. 
Respondents were primarily concerned with the steps that come after the alert: prioritizing the threats and determining how to approach each one. 
ESGs research found gathering data related to an alert is the most time-consuming task for 35% of respondents. Malware analysis and analyzing log repositories fell second; each were top among 31% of respondents.
The threat overload isnt a problem that can be solved by throwing more people at it, says Stern, because there are not enough people available to be thrown. Security teams are often understaffed or lack expertise to face todays threats. Previous ESG research found only 17% of businesses say the size of their security operations team is always sufficient.
Processes are also chaotic because most security operations teams invent their own wheel, says Stern. Theres no centralized platform for running security operations, as there is in other departments like sales, marketing, and human resources.
Stern explains how businesses are turning to orchestration to tie together different systems and better coordinate incident response. Orchestration structures threat detection and response to help manage the process so security teams dont have the rely on myriad tools.
When asked about their security priorities for 2017, 39% of respondents in ESGs survey said they plan to invest in processes and technologies to automate security operations related to incident response. More than one-third (35%) plan to invest in threat detection technologies.
The idea is to find the balance between automating wherever possible and empowering the human analyst where needed, he says. No security manager would say they want to fully automate their incident response.
Related Content
Reactive to Proactive: 7 Principles Of Intelligence-Driven Defense
To Attract and Retain Better Employees, Respect Their Data
More than Half of Security Pros Rarely Change their Social Network Passwords

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Half of Security Pros Ignore Some Important Alerts