Cybersecurity Challenges that Take Miracles to Solve
Annos Mirabilis: Part 1 of 2
Written by: Prasanth Ganesan , Founder & CEO at System Two Security , and Kamesh Raghavendra , Chief Product Officer at The Hive, LLC
Cybersecurity: An uneven arms race that favors adversaries.
Today, the annual costs of cybersecurity incidents represent around 6% of global GDP. The impact of cybersecurity threats dwarfs the annual impact of wars (about 1.5%) and the total global military spending (about 2.2%) combined. The first and the only significant line of defense against these threats is enterprise cybersecurity spending, which roughly averages at 1% of revenues or 10% of IT budgets . This spending is distributed across three layers of infrastructure, each of which is either built in-house or outsourced to managed security service providers (MSSPs):
With such a state of affairs in cyber-defense, it doesn’t come as a surprise that enterprises take an average time of 277 days to detect cybersecurity breaches. The battleground continues to be tilted in favor of the adversaries despite decades of concerted above mentioned investments in technology, training and organization by both enterprises and nation states.
The adversaries continue to gain advantage in cybersecurity due to the following factors favoring them:
Recommended by LinkedIn
Unfulfilled Promise of AI: Too artificial to subdue adversaries.
As the Pentagon’s CIO, Dave McKeown, recently rued , attempts to apply AI in cybersecurity have been disappointing at best. The success in applications of AI in consumer Internet products stands in stark contrast with the dismal failure of traditional AI in cybersecurity to dent the 277 days taken to detect breaches, despite attempts from both big vendors and startups over the past 15yrs. These attempts have struggled with multiple challenges in cybersecurity AI:
Broken Economics: Too many vendors and tools to scale.
Enterprises are forced to depend on multiple detection engineering vendors for intelligence on new threats and attacks as they are incapable of scaling internal organizational talent, detection rules or AI. Each vendor in an enterprise’s fast growing SOC tool list was added due a new attack surface or new category of threat actor in the past, and the enterprise grapples with the risk of decommissioning the tool. These vendors often compete with one another and have proprietary data process workflows that bring huge inefficiencies and cost burden to the enterprise.
Some large vendors are vehemently advocating tool consolidation . However, it will remain an elusive goal until enterprises have direct near real-time path to detecting, containing, and responding to new threat actor behaviors, which would displace all indirect time-delayed dependencies on tool vendors.
The uneven arms race of cybersecurity prohibits enterprises from depending on a sole tool vendor (or “arms provider”) even if such a consolidation may provide significant cost benefits. SOCs will continue to be doomed to stay on the shaky middle-ground of depending on indirect intelligence about new threat actor behaviors from multiple vendors and tools.
Thus, the miracle years of cybersecurity have eluded us for the past two decades due to:
The recent advent of Generative AI brings new underlying technologies that are changing this. In the next blog, we delve into the promises of this technology and our product that delivers it for addressing the above challenges head-on.