Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

Cybersecurity lessons learned from a bike manufacturer

By Bill Franklin
VanMoof-Bike.jpg

Image via Unsplash

April 13, 2023

About a decade ago, the Dutch bike company VanMoof found themselves in a pickle: when they started shipping their products to America, the bikes were repeatedly damaged in shipping. As unhappy customers and expensive replacements piled up, they knew they had to find a solution for this, and fast. The solution they found wasn’t an expensive re-engineering project or finding “better” boxes. Instead, the fix was much simpler yet much more effective: they printed a picture of a flat screen television on their boxes so carriers would handle them with the care they would when handling a TV. Immediately, shipping damages went down about 80%.

The reason I’m telling you a story about a bicycle company is that the cybersecurity industry is sitting exactly where VanMoof found itself almost a decade ago. Only instead of damaged bikes, organizations are facing multi-million dollar network breaches. VanMoof succeeded not by changing their products, but by asking a different question. And we need to do the same. 

Instead of asking ourselves how to contain the threats, we have to ask ourselves: why are we allowing known threat actors in and out of our networks in the first place? 

The challenges of modern-day networks and security are well documented. Here are just a few: 

  • Too many tools to manage. Organizations (on average) use around 45 different tools to manage cybersecurity threats. This puts an undue burden on cybersecurity teams. Which brings us to…
  • A talent crisis. A recent study indicated that 70% of cybersecurity professionals feel their department is understaffed. By 2025, we can expect up to 3.5 million cybersecurity job openings worldwide. Overburdened with both workloads and suffering from alert fatigue, many are leaving the industry entirely, further exacerbating a crisis. And when demand is high, prices shoot up: the costs of hiring and retaining these high-demand employees are eye-popping.
  • Siloed tools. Integrating all these technologies is often difficult, if not impossible, leading to cracks in the system threat actors can exploit. 
  • Astronomical costs. Many of the must-have tools in modern security stacks cost millions of dollars, not just to purchase, but to maintain as well. 

The solution is also exacerbated by threat actors who are sophisticated, motivated, and well-funded, often by nation-states. A dispersed workforce has led to wide and open attack surfaces, and the payouts have been enormous. For every hole they exploit, we have developed a technology to identify and respond to it and added another acronym to our security stacks. The problem is that even after all our technological advances we’re still losing. 

Shifting to a proactive approach

When firewalls arrived 20-plus years ago, they were heralded as the proactive network protection we had been waiting for. Fifteen years ago, “next-generation” firewalls arrived, promising the same. Unfortunately, this is where the proactive cybersecurity technology development seems to have stalled, despite the amount of encrypted traffic the firewalls are expected to handle exploding in volume. This stagnation also explains the focus on developing “Detect and Respond” technologies.  

The amount of traffic hitting network security stacks is growing exponentially as the tools and technologies threat actors have at their disposal become cheaper and more accessible via the dark web. The modern-day attacker can easily run programs/bots to scan internet connections to see what is protected. They have used techniques to obfuscate intrusion detection systems (IDS), intrusion prevention systems (IPS) and deep packet inspection (DPI)as part of building profiles of company activities. Firewalls have been tasked to act as the sole proactive defense to thwart threat actors from coming into the network, but more importantly, out of it, too. It shouldn’t come as a surprise that decades-old technologies have been unable to keep up with these new demands.

One example of firewall limitations is the ingestion of threat intelligence. The amount of vital third-party threat intelligence firewalls can ingest is capped by both hardware and software limitation, which means they have been tasked with enforcement without a full view of the threat landscape. Once we add in sophisticated “side door” network access such as AI-assisted phishing emails/links, insider threats, etc., threat actors essentially have free reign in and back out of the networks. 

Instead, what if we leveraged the full power of the cyber intelligence community to stop these known threat actors before they can inflict damages in the first place? And, more importantly, why aren’t we doing that already? 

Sometimes the simplest and most effective solutions go unnoticed, much to Occam’s dismay. Leveraging the full power of threat intelligence after a breach has occurred is good, but doing this before one is much, much better. This is the crux of proactive security: protecting our networks and lightening the load we have placed on all our tools so they can actually perform their functions as designed. 

The shift to proactive security doesn’t require massive engineering projects or network redesigns. VanMoof succeeded by asking themselves how the carriers were viewing their product, and where it was going wrong. When we ask who these threat actors are, and why they are allowed in the networks, the solution of moving to proactive security becomes clear as the image of a TV on a box. 

 

KEYWORDS: cybersecurity assessment firewall protections network security proactive security threat intelligence

Share This Story

Bill Franklin is the Head of Business Development at ThreatBlockr.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!