IT disaster recovery, cloud computing and information security news

Too much security data holding information security back: many see machine learning as the answer

CyberEdge Group has published its sixth annual Cyberthreat Defense Report (CDR). The report found that IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of respondents acknowledged their organization’s intent to acquire advanced security analytics solutions that incorporate machine learning (ML) technology within the next 12 months. Such investments help to mitigate the risks of advanced cyberthreats missed by traditional security defences / defences, aiding enterprise cyber threat hunting.

With 1,200 IT security decision makers and practitioners participating from 17 countries, six continents, and 19 industries, CyberEdge’s CDR ‘provides a 360-degree view of cyberthreats, current defenses, and planned security investments by organizations of all sizes and across all industries’.

Key findings include:

Hottest security technology for 2019
Advanced security analytics tops 2019’s most wanted list not only for the security management and operations category, but also for all technologies in this year’s report.

Machine learning garners confidence
More than 90 percent of IT security organizations have invested in ML and/or artificial intelligence (AI) technologies to combat advanced threats. More than 80 percent are already seeing a difference.

Attack success redux
The percentage of organizations affected by a successful cyberattack ticked up this year, from 77 percent to 78 percent, despite last year's first-ever decline.

Caving in to ransomware
Organizations affected by successful ransomware attacks increased slightly from 55 percent to 56 percent. More concerning, the percentage of organizations that elected to pay ransoms rose considerably, from 39 percent to 45 percent, potentially fueling even more ransomware attacks in 2019.

Container security woes
For the second year, application containers edge mobile devices as IT security’s weakest link.

Web application firewalls rule the roost
For the second year, the web application firewall (WAF) claims the top spot as the most widely deployed app/data security technology.

Worsening skills shortage
IT security skills shortages continued to rise, with 84 percent of organizations experiencing this problem compared to 81 percent a year ago.

Security’s slice of the IT budget pie
On average, IT security consumes 13 percent of the overall IT budget. The average security budget is going up by 5 percent in 2019.

More details.



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.