Over half of enterprise firms don’t have a clue if their cybersecurity solutions are working

Over half of enterprise companies investing in cybersecurity tools and solutions to protect their business interests have no idea how well they are performing, research suggests.
On Tuesday, AttackIQ and the Ponemon Institute released new research on the current state of cybersecurity strategies and investment in the enterprise realm.
The report, "The Cybersecurity Illusion: The Emperor Has No Clothes," includes responses from 577 IT and IT security practitioners working for US enterprise companies and suggests that while security budgets are increasing, awareness around cybersecurity as a whole is not.
On average, enterprise firms are spending $18.4 million every year on cybersecurity and 58 per cent are planning to increase this level of investment by up to 14 per cent over the 2019 - 2020 period.
However, those surveyed admitted that after deployment, cybersecurity solutions monitoring is thin on the ground and a total of 53 per cent have no idea how well the tools and software implemented in corporate networks are performing.
With 47 cybersecurity solution deployments reported as an average, it is no wonder that IT staff have a tough time tracking and monitoring each tool.
A lack of visibility can muddy the water when it comes to a return on investment (ROI) and, furthermore, can mask any existing security holes which remain unresolved despite the implementation of cybersecurity solutions.
Only 39 per cent of survey respondents said that their organizations are receiving full value from their investments, but this in itself could indicate that monitoring and performance metrics are an issue when it comes to ROI.
Cybersecurity and IT staff included in the research also reported an interesting issue with false reports and inadequate barriers to their networks. In total, 63 per cent said they have experienced a security control reporting a threat blocked when in reality, the tool failed to stop malicious behaviour.
"When processes and solutions like this fail, many companies respond by throwing more money at the problem," Larry Ponemon, founder and chairman of the Ponemon Institute commented. "Further security spending needs to be put on hold until enterprise IT and security leaders understand why their current investments are not able to detect and block all known adversary techniques, tactics, and procedures."
The fog surrounding cybersecurity in enterprise networks also appears to be contributing to failures in preventing data breaches. In total, 58 per cent of respondents said a lack of visibility is a reason data breaches still occur at their companies, and only 41 per cent of IT professionals believe their teams are effective in finding and plugging security holes in corporate infrastructure.
When it comes to penetration testing, less than 60 per cent of those surveyed said routine tests take place, and close to one-third have no set dates or schedules in place. In addition, less than half -- 48 per cent -- of respondents said that a security validation (CSV) platform is used to monitor the security of their networks.
"Companies are spending far too much money on cybersecurity solutions without knowing if they are effective," said Brett Galloway, AttackIQ CEO. "More than half of the experts surveyed admit they are in the dark about how well the technologies they have are working and if they're truly effective, which is alarming considering companies are relying on these technologies to protect sensitive information including customer data."
source zdnet
Industry: Cyber Security

Latest Jobs
-
- IAM Consultant- OKTA
- Germany
- upto €90,000 plus benefits
-
I am looking for an experienced IAM process Manager to help drive forward a series of IAM implementation for a global Manufacturing business, Ideally you will be skilled with Okta and have knowledge of PAM Solutions, You will be responsible for: Driving the design and continuous improvement of complex IAM solutions in close collaboration with business partners Consult on the optimisation of IAM processes and design proper IT-based solutions to meet availability and quality targets Define technical specifications for SW-development (standards, design patterns, test cases, scenarios) and manage the life cycle of designed solutions Actively scan for relevant innovations and new technologies to identify further potential for improving IAM solutions and processes using OKTA Analyse new features of the regular Okta releases We are looking for someone with strong IAM experience as an Architect, Analyst, Technical Engineer, or similar role in the Identity and Security domain Experience with relevant certifications in development/administration, design and configuration of the Okta IAM platforms Familiar with LCM - joiners, movers, leavers, application federation - SAML, OIDC, SCIM and many other IAM terms Good mix of competences in IAM business process and project management concepts and tools e.g., ServiceNow, Jira, PRINCE2, SCRUM (agile)
-
- SAP Security Consultant
- France
- upto €70,000 plus benefits
-
I am looking for an experienced SAP Security Consultant. The ideal candidate will have a strong understanding of SAP security concepts and be able to apply them to real-world scenarios. ideally you will also have experience with Securitybridge or Onapsis, or a similar SAP security tool. Your responsibilities will include: Reviewing and auditing SAP security settings and controls Identifying and remediating security vulnerabilities Implementing security best practices Educating users on SAP security Experience experience in SAP security Experience with Securitybridge or Onapsis, or a similar SAP security tool would be very advantageous Strong understanding of SAP security concepts Excellent problem-solving and analytical skills Excellent communication and presentation skills Fluent in French & English
-
- Post Grad MSc Cyber security - Junior Cyber Risk Analyst wanted. UK
- United Kingdom
- Entry role
-
The perfect start to your new Cyber Security Career. Post Graduate Cyber Risk Analyst Wanted. Are you are fresh from earning your Cyber Security MSc and eager to start your career in Cyber Security? We are looking for a recent post graduate to join a forward thinking Cyber Security Consultancy for the ideal entry role into Cyber Security. Whilst employed industry experience is not expected, as full training and support will be provided, a history of recent education in Cyber Security / Cyber Risk is essential. We are looking for someone with an inquisitive mind, who is confident to ask the right questions and who isn't afraid to challenge the status quo. Superb communication skills are a must (in person, written and verbal) This is a UK based role that is remote first with monthly travel (1-2 a month) to meet with the team and in time to meet clients. If you aren’t available to travel this isn’t the opportunity. We are unable to provide VISA sponsorship as there will be a requirement to achieve Security clearance If you're adaptable, open to fresh perspectives, and excited to be part of a forward-thinking team and looking for an opportunity to help make a difference in a Cyber consulting role, this opportunity is for you. For more information apply here……
-
- Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared
- London
- OUTSIDE IR35
-
Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared • We require someone that has experience of migration exchange from windows server 2012 to 2019. • In depth understand of On-Prem exchange server management and deployment. • Experience migrating On-Prem exchange servers from 2012 upwards. • Secure Email Gateway experience essential Due to the nature of the requirement the individual must be commutable to London 2-3 days a week.