Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

The new problem in cybersecurity: Slaying the data dragon

By Dave DeWalt
bid-data-freepik1170x658x.jpg
March 25, 2022

For the past many years, the focus in cybersecurity has been on collecting data. Data is a powerful tool and critical to finding the patterns, insights or behavioral signals that might signal a vulnerability in the organization’s protection stance or even an attack underway. 


Yet, those benefits have led us to a new problem: we are now drowning in data. There are mountains of log data accumulating across the enterprise, pulled from open systems, cloud-native endpoints, security and compliance feeds, interconnected applications, servers, Internet of Things (IoT) data and more. The result is accumulating cost and overwhelmed engineers and analysts that must deal with false positive alerts and unending actions to investigate. 


This is much greater than a simple data headache. Instead, the overload of data is actually introducing a new type of risk to organizations and forcing them to make difficult choices, often resulting in less security not more.


Nine in ten security leaders indicated in a recent Harris poll that they rely on log data to flag potential attacks and other tasks. Yet, more than half of organizations (57%) said they are forced to limit the number of logs they ingest or store because it is simply too expensive to store them all. As a result, 63% said they sometimes don’t have the logs they need to troubleshoot or debug systems, and 82% of senior leaders said incident response efforts are hindered. 


These obstacles standing between defenders and their ability to protect their organization sit starkly against the current threat landscape, which exhibited record numbers of attacks in 2021 and shows no signs of slowing down in 2022. According to Cybersecurity Ventures, cyberattacks were expected to cost organizations $6 trillion by 2021, up from $3 trillion in 2015. This is an astronomical level of new risk to organizations in every industry. 


Organizations need to be able to drive more value from the data they have on hand, particularly when it comes to observability data. Observability has increased in popularity in recent years, bringing together monitoring tasks with additional context on potential issues and why they might be occurring. By increasing their data observability capabilities, organizations can improve performance, threat detection, incident response and other key processes. 


In addition to volume, there are other challenges facing organizations. These include organizational and data silos, vendor lock-in and a multitude of tools that don’t meet the needs of multiple data consumers. Further challenges arise in the DevOps and DevSecOps worlds, where processes are accelerated due to autonomy and create new requirements around data access.   


There are some tools on the market to address these challenges. However, according to the same survey, 66% said those tools are not easy to use, 67% said the tools make it difficult to collaborate across teams and 58% said they struggle to route security events towards resolution. This means the data problem is not yet solved, despite the fact that two-thirds of organizations are spending more than $100,000 and one-third are spending $300,000 a year or more on these tools. 


Organizations need to consider ways to derive more value from their logs and gain more insights from the ones they do collect and store. To stay compliant and secure, dropping logs is not an option. Instead, organizations should consider solutions that can help structure the data and route it to the appropriate location for specific use cases to help manage cost and get more value from their data across the entire organization. 


In cybersecurity, we are lucky to gain increasing new data and insights from across the organization every day. By pairing that data with actionability, cybersecurity leaders stand a chance to better mitigate, detect and respond to the attacks they will inevitably face this year and into the future.  

KEYWORDS: cyber security data breach data security incident response risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave dewalt headshot

Dave DeWalt is Founder and Managing Director of NightDragon, an investment and advisory firm focused on growth and late-stage companies within the cybersecurity, safety, security and privacy industries. Focused on technology and cybersecurity, DeWalt helped create more than $20 billion of shareholder value during his 15-plus years as President and CEO of Documentum, McAfee and FireEye. 

 

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security software

    SOAR and the problem of data protection

    See More
  • Diana Dragon-Head of Global Crisis Resources-eBay

    Diana Dragon — Managing Global Crises In the Public and Private Sector

    See More
  • Person tapping AI app on phone

    Security isn’t convenient, and that’s a big problem in the age of AI

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing