Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Two words will change your cybersecurity in 2022

By Dave Karp
cyber-security-freepik1170x658v486.jpg

Image by mikeygl via Freepik

May 13, 2022

Two words will uplevel your cybersecurity in 2022 — simplify and consolidate. To thrive in today’s market, organizations must apply these principles to their operational systems.


More than ever, reducing your security team’s load is critical for recruitment and retention. Don’t add more tools and programs; instead, get back to basics. Using the essential tools wisely will improve your security posture far more than throwing money at vendors.


Even at an enterprise level, businesses don’t need 50+ huge security tools with all the bells and whistles, most of which never get used. Instead, you need tools that allow users to have a cohesive view of things. Silos are for farms, not IT ecosystems. To reduce the number of tools by 20–30%, lean more heavily on comprehensive tools. Choose solutions that focus on a problem, solving it well and thoroughly.


Too Many Tools

Remote work and accelerated cloud migration sent many companies scrambling to cover their assets as the traditional security perimeter disintegrated. They rushed to add new security measures to handle problems as they arose. While these solutions may have delivered on its core functionality, many were hyper-focused. They did not lend themselves to functionality outside their scope, creating a tangled web of tools and solutions for staff to manage and oversee. This increased load overburdened the thinly stretched staff, required more onboarding time, and delayed new team members working to ramp up. 


Integration Matters

The best way to combat this proliferation of tools is to adopt a unified approach. Vendors should adopt it in their design, and organizations need to use it as a principle for guiding their programs. For example, critical tools like patch management, antivirus (AV), threat detection, vulnerability assessment, host-based firewall, and host-based intrusion detection can be unified into a single platform rather than broken out using several point solutions. When components that share similar functionality operate together, it not only eases the burden on staff and offers more comprehensive information, it also makes the data more actionable. Collecting incoming data on the firewall from known command and control (C&C) IP addresses can alert the threat detection, a routine procedure that begins to make outbound requests randomly over port 53, encapsulated in DNS, which would be stopped via a rule in the firewall, or alert AV that a possible infection may have occurred, allowing staff to remediate the attack in its early phases. 


Solutions need to go beyond integration and move toward interoperation. Tools must work together, sharing findings in a meaningful and actionable manner. Vendors embracing this approach will standardize APIs and ingestion methodologies, streamlining inter-solution communication. Individual tools can still uniquely metabolize this data via machine learning or as a cross-reference to evaluate findings. The goal of any cross-tool data sharing is better visibility for your organization. Amalgamating multiple streams of security intelligence into a unified console helps improve overall security in several ways. 


Better Vision Better Security


Your security posture benefits immediately from administration simplification for existing security operations. Intelligence gathering becomes more efficient when data is centralized. With multiple data streams amalgamated, security professionals draw more relevant insights on potential attacks. These streams viewed individually might seem like noise or false positives but taken in context with other data points, the scope of a broader attack becomes apparent. 


Check Yourself

Until vendors universally adopt a unified approach, the burden falls on the enterprise to simplify and consolidate. The self-assessment needs to consider what solutions are actively used by staff and determine if there are solutions that are unified in name only, without truly interoperating. 


Utilizing this approach will streamline your organization’s security operations. Remove tools that are underutilized or require excess management. Move toward solutions that deliver multiple interconnected functionalities. This will reduce time wasted on administration, optimizing team utilization for more impactful security work.


The unified approach goes beyond streamlining to creating a better organizational security posture. With shared data across tools, organizations rapidly identify potential threats allowing them to take proactive steps. Mitigating attacks early prevents breaches and data disclosures that cost organizations both financially and reputationally. 


Simplify and consolidate — these two principles make up the unified approach. Embracing this approach will do more than strengthen security postures. It will help vendors produce more effective products, decrease staff burnout, all while saving organizations from the financial and reputational damage the breaches bring.


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cyber security data breach information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Karp has more than 20 years of experience in information security and has excelled in diverse roles within sales, product management, marketing, consulting and managed services. Before joining Comodo as Chief Strategy Officer, Dave helped define the strategy at ShieldX Networks, resulting in an acquisition by Fortinet. Prior to ShieldX, Dave was the Chief Product Officer at Digital Guardian. Dave is a graduate of the University of Oklahoma, where he returns on Saturday’s throughout the Fall to cheer on the OU Sooner football team.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • bots-freepik1170x658.jpg

    Why scalper bots will be your worst security nightmare in 2022

    See More
  • It's Time to Change Your Perception of the Cybersecurity Professional

    It's Time to Change Your Perception of the Cybersecurity Professional

    See More
  • Computer log in screen

    Make Change Your Password Day an impetus to boost overall cybersecurity

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing