Recently, a survey by the Ponemon Institute, sponsored by AttackIQ, unveiled complexity issues and visibility issues in enterprise cybersecurity. In “The Cybersecurity Illusion: The Emperor Has No Clothes,” Ponemon surveyed 577 IT and IT security practitioners in the United States. They discovered that though enterprises spend an average of $18.4 million annually on cybersecurity, data breaches persist.
Among the key findings of the Ponemon Institute and AttackIQ, they determined:
- 53% of experts admit to feeling in the dark about how their technologies perform and meet cybersecurity expectations.
- Additionally, only 39% of respondents feel they get the full value from their security investments.
- Only 41% say their enterprise can effectively determine security gaps and close them.
- Meanwhile, 56% say data breaches persist due to visibility issues in their networks.
- Only 35% say they have a high degree of confidence in visibility in their cloud and IoT devices.
The Ponemon Institute and AttackIQ cite multiple causes at the heart of these issues. Indeed, enterprises often face a lack of in-house expertise due to the cybersecurity staffing crisis. However, enterprises also face an insidious threat: complexity issues.
Why Complexity Issues Persist in Cybersecurity
In part, Ponemon and AttackIQ found complexity issues persist in cybersecurity due to a lack of automation. Only 24% of the respondents say they use an automated solution which could help them close security gaps.
Yet most complexity issues in cybersecurity stem from over, not under, preparing. On average, respondents say their enterprises deploy 47 separate cybersecurity solutions. Having so many solutions deployed at once does not close cybersecurity gaps. In fact, too many solutions can cause integration issues which in turn creates more cyber security gaps.
Instead, enterprises should look for a streamlined cybersecurity and SIEM solution which fits their particular use case. Ideally, this solution should offer next-generation SIEM capabilities like threat detection, security correlation, and log management, as well as scalability.
You can learn more by reading our 2019 SIEM Buyer’s Guide. In it, we cover the top providers in the field and their key capabilities. Also, you can check out the “The Cybersecurity Illusion: The Emperor Has No Clothes” report by the Ponemon Institute and AttackIQ here.
Latest posts by Ben Canner (see all)
- Nearly 90 Percent of Global Enterprises Targeted by Phishing Attacks - January 24, 2020
- The 9 Best LinkedIn SIEM Groups You Should Join - January 22, 2020
- Top 5 SOAR Vendors to Watch in 2020 by Solutions Review - January 16, 2020