Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Is Cybercrime Just a Cost of Doing Business?

Where cybercrime is going and what you can do about it

By Steve Grobman
cyber_enews
January 26, 2016

Is cybercrime, once an annoyance, now an ever-present threat, next just a cost of doing business?

The evolution of malicious code, attacker motivations, and technical capabilities has taken us past malware and suspicious files into a much more complex and threatening environment. The threat is no longer malware and and suspicious files. It is about protecting memory, system registries, and lateral moves through virtual machines. Businesses are being held hostage by ransomware, hardware vulnerabilities are being exploited to slip under traditional security defenses, and advanced code techniques can sleep to evade sandbox traps and morph continually to defy signature-based detection. Will we reach a state where security breaches and data theft are just factored into the cost of operations?

Our answer is “no,” but a revised security strategy is needed to properly address the current and future cyberthreat environment.

The rules are changing, and attackers will continue to defy them.

Two major things are happening to the threat landscape: we are drastically changing the IT architecture, and our adversaries are ignoring any and all rules of engagement. Both have roots in the technologies that are powering our businesses, such as social media, Internet of Things, smartphones and tablets, increased mobility, and cloud computing. Attackers are adopting these technologies as fast as we are, using cloud services for limitless scale and anonymity, mining social media for targeted phishing, and exploiting our devices and mobility for multi-vector attacks.

We need greater awareness of what is happening around us.

In any security situation, awareness and context are critical. Those old posters from World War II, about loose lips, careless talk, and “the enemy is listening” were great at keeping awareness high. We have to continually educate our people about security best practices, particularly around phishing and other attempts to exploit human weaknesses. Our security tools also require greater awareness. It is no longer sufficient to just defend the corporate endpoints, network, and data center. Isolated tools take too long to update with current information, whether it is local events or global threat intelligence. They need to talk to each other in real-time, publishing and consuming information, and collaborating on their responses. Our new environment of clouds and devices is smart and always connected, and our security tools need to be at the same level or higher.

It is time for the machines to help out.

The high cost of a security breach means that detection and response speed matter. Human processing and reaction times are just not fast enough for the volume of information and the speed of compromise, and the growing shortage of skilled security personnel will only exacerbate the problem. Machine learning is necessary to correlate events and identify emerging attacks. More automation not only gives us the speed we need; it also frees up security staff from routine tasks and restores their capacity to focus on the broader and more important activities. Most important, we need cloud-based analytics for scale and adaptability.

Defenses will be adaptive, predictive and scalable.

At the end of the day, this new environment is all about the data, not the devices. Identifying and protecting your data, and analyzing security data to detect and correct digital threats. With data spread all over the cloud, a modern security strategy requires multiple vantage points to observe behavior, in the cloud, on premise, and on the device. Cloud-based analytics are necessary for scale and speed. On-premise solutions enable customization and agility. On-device security components deliver local protection and trusted execution. Automation and machine learning will contribute adaptability and speed, shifting actions from forensic clean up to probability-based protection. Most importantly, we need to reduce the complexity of configurations and operations so that our security personnel can focus on the business and tailoring defenses to their organizational requirements.

No, it’s not acceptable to have to build a few hundred ransom payments and bi-annual security breaches into your bottom line. And it doesn’t have to be if we plan our security strategies less around the things that will change, and more around those things that won’t change.

We will need agility, awareness, automation, analytics, scalability and adaptability. Of these things we can be sure. 

KEYWORDS: big data cost of doing business cybercrime security awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Grobman is chief technology officer at Intel Security where he sets the technical strategy and direction for the company's security business across hardware and software platforms, including McAfee and Intel's other security assets.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Employee Theft: It is Not the Cost of Doing Business!

    See More
  • Majority Of Americans Think TSA Is Doing A Good Job

    See More
  • Cybersecurity Leadership Images

    Cybercrime to Cost Global Business $8 Trillion in the Next 5 Years

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing