Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Two words will change your cybersecurity in 2022

By Dave Karp
cyber-security-freepik1170x658v486.jpg

Image by mikeygl via Freepik

May 13, 2022

Two words will uplevel your cybersecurity in 2022 — simplify and consolidate. To thrive in today’s market, organizations must apply these principles to their operational systems.


More than ever, reducing your security team’s load is critical for recruitment and retention. Don’t add more tools and programs; instead, get back to basics. Using the essential tools wisely will improve your security posture far more than throwing money at vendors.


Even at an enterprise level, businesses don’t need 50+ huge security tools with all the bells and whistles, most of which never get used. Instead, you need tools that allow users to have a cohesive view of things. Silos are for farms, not IT ecosystems. To reduce the number of tools by 20–30%, lean more heavily on comprehensive tools. Choose solutions that focus on a problem, solving it well and thoroughly.


Too Many Tools

Remote work and accelerated cloud migration sent many companies scrambling to cover their assets as the traditional security perimeter disintegrated. They rushed to add new security measures to handle problems as they arose. While these solutions may have delivered on its core functionality, many were hyper-focused. They did not lend themselves to functionality outside their scope, creating a tangled web of tools and solutions for staff to manage and oversee. This increased load overburdened the thinly stretched staff, required more onboarding time, and delayed new team members working to ramp up. 


Integration Matters

The best way to combat this proliferation of tools is to adopt a unified approach. Vendors should adopt it in their design, and organizations need to use it as a principle for guiding their programs. For example, critical tools like patch management, antivirus (AV), threat detection, vulnerability assessment, host-based firewall, and host-based intrusion detection can be unified into a single platform rather than broken out using several point solutions. When components that share similar functionality operate together, it not only eases the burden on staff and offers more comprehensive information, it also makes the data more actionable. Collecting incoming data on the firewall from known command and control (C&C) IP addresses can alert the threat detection, a routine procedure that begins to make outbound requests randomly over port 53, encapsulated in DNS, which would be stopped via a rule in the firewall, or alert AV that a possible infection may have occurred, allowing staff to remediate the attack in its early phases. 


Solutions need to go beyond integration and move toward interoperation. Tools must work together, sharing findings in a meaningful and actionable manner. Vendors embracing this approach will standardize APIs and ingestion methodologies, streamlining inter-solution communication. Individual tools can still uniquely metabolize this data via machine learning or as a cross-reference to evaluate findings. The goal of any cross-tool data sharing is better visibility for your organization. Amalgamating multiple streams of security intelligence into a unified console helps improve overall security in several ways. 


Better Vision Better Security


Your security posture benefits immediately from administration simplification for existing security operations. Intelligence gathering becomes more efficient when data is centralized. With multiple data streams amalgamated, security professionals draw more relevant insights on potential attacks. These streams viewed individually might seem like noise or false positives but taken in context with other data points, the scope of a broader attack becomes apparent. 


Check Yourself

Until vendors universally adopt a unified approach, the burden falls on the enterprise to simplify and consolidate. The self-assessment needs to consider what solutions are actively used by staff and determine if there are solutions that are unified in name only, without truly interoperating. 


Utilizing this approach will streamline your organization’s security operations. Remove tools that are underutilized or require excess management. Move toward solutions that deliver multiple interconnected functionalities. This will reduce time wasted on administration, optimizing team utilization for more impactful security work.


The unified approach goes beyond streamlining to creating a better organizational security posture. With shared data across tools, organizations rapidly identify potential threats allowing them to take proactive steps. Mitigating attacks early prevents breaches and data disclosures that cost organizations both financially and reputationally. 


Simplify and consolidate — these two principles make up the unified approach. Embracing this approach will do more than strengthen security postures. It will help vendors produce more effective products, decrease staff burnout, all while saving organizations from the financial and reputational damage the breaches bring.


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cyber security data breach information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Karp has more than 20 years of experience in information security and has excelled in diverse roles within sales, product management, marketing, consulting and managed services. Before joining Comodo as Chief Strategy Officer, Dave helped define the strategy at ShieldX Networks, resulting in an acquisition by Fortinet. Prior to ShieldX, Dave was the Chief Product Officer at Digital Guardian. Dave is a graduate of the University of Oklahoma, where he returns on Saturday’s throughout the Fall to cheer on the OU Sooner football team.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • bots-freepik1170x658.jpg

    Why scalper bots will be your worst security nightmare in 2022

    See More
  • CONVERGANCE STRATEGIES (SPECIAL REPORT): IP Cameras Will Change Your Life

    See More
  • CONVERGANCE CONNECTIONS (SPECIAL REPORT): IP Cameras Will Change Your Life

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing