Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

The new problem in cybersecurity: Slaying the data dragon

By Dave DeWalt
bid-data-freepik1170x658x.jpg
March 25, 2022

For the past many years, the focus in cybersecurity has been on collecting data. Data is a powerful tool and critical to finding the patterns, insights or behavioral signals that might signal a vulnerability in the organization’s protection stance or even an attack underway. 


Yet, those benefits have led us to a new problem: we are now drowning in data. There are mountains of log data accumulating across the enterprise, pulled from open systems, cloud-native endpoints, security and compliance feeds, interconnected applications, servers, Internet of Things (IoT) data and more. The result is accumulating cost and overwhelmed engineers and analysts that must deal with false positive alerts and unending actions to investigate. 


This is much greater than a simple data headache. Instead, the overload of data is actually introducing a new type of risk to organizations and forcing them to make difficult choices, often resulting in less security not more.


Nine in ten security leaders indicated in a recent Harris poll that they rely on log data to flag potential attacks and other tasks. Yet, more than half of organizations (57%) said they are forced to limit the number of logs they ingest or store because it is simply too expensive to store them all. As a result, 63% said they sometimes don’t have the logs they need to troubleshoot or debug systems, and 82% of senior leaders said incident response efforts are hindered. 


These obstacles standing between defenders and their ability to protect their organization sit starkly against the current threat landscape, which exhibited record numbers of attacks in 2021 and shows no signs of slowing down in 2022. According to Cybersecurity Ventures, cyberattacks were expected to cost organizations $6 trillion by 2021, up from $3 trillion in 2015. This is an astronomical level of new risk to organizations in every industry. 


Organizations need to be able to drive more value from the data they have on hand, particularly when it comes to observability data. Observability has increased in popularity in recent years, bringing together monitoring tasks with additional context on potential issues and why they might be occurring. By increasing their data observability capabilities, organizations can improve performance, threat detection, incident response and other key processes. 


In addition to volume, there are other challenges facing organizations. These include organizational and data silos, vendor lock-in and a multitude of tools that don’t meet the needs of multiple data consumers. Further challenges arise in the DevOps and DevSecOps worlds, where processes are accelerated due to autonomy and create new requirements around data access.   


There are some tools on the market to address these challenges. However, according to the same survey, 66% said those tools are not easy to use, 67% said the tools make it difficult to collaborate across teams and 58% said they struggle to route security events towards resolution. This means the data problem is not yet solved, despite the fact that two-thirds of organizations are spending more than $100,000 and one-third are spending $300,000 a year or more on these tools. 


Organizations need to consider ways to derive more value from their logs and gain more insights from the ones they do collect and store. To stay compliant and secure, dropping logs is not an option. Instead, organizations should consider solutions that can help structure the data and route it to the appropriate location for specific use cases to help manage cost and get more value from their data across the entire organization. 


In cybersecurity, we are lucky to gain increasing new data and insights from across the organization every day. By pairing that data with actionability, cybersecurity leaders stand a chance to better mitigate, detect and respond to the attacks they will inevitably face this year and into the future.  

KEYWORDS: cyber security data breach data security incident response risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave dewalt headshot

Dave DeWalt is Founder and Managing Director of NightDragon, an investment and advisory firm focused on growth and late-stage companies within the cybersecurity, safety, security and privacy industries. Focused on technology and cybersecurity, DeWalt helped create more than $20 billion of shareholder value during his 15-plus years as President and CEO of Documentum, McAfee and FireEye. 

 

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • security software

    SOAR and the problem of data protection

    See More
  • Man coding

    The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

    See More
  • Diana Dragon-Head of Global Crisis Resources-eBay

    Diana Dragon — Managing Global Crises In the Public and Private Sector

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing