53% of IT leaders plan to hunt for threats by 2023
- April 26, 2022
- 0
ONLY 3 OF THE COMPANIES HAVE MATURITY IN THREAT HUNTING According to recent research, 53 IT leaders are ready to hunt for threats in the coming year. While
ONLY 3 OF THE COMPANIES HAVE MATURITY IN THREAT HUNTING According to recent research, 53 IT leaders are ready to hunt for threats in the coming year. While
ONLY 3 OF THE COMPANIES HAVE MATURITY IN THREAT HUNTING
According to recent research, 53 IT leaders are ready to hunt for threats in the coming year. While 96 of the respondents in WatchGuard’s survey agreed that continuous monitoring and threat detection should be the top security initiatives, WatchGuard Turkey and Greece Country Manager Yusuf Evmez evaluates IT leaders’ 2023 threat discovery efforts and highlights of the research.
Cyberthreat hunting involves the process of proactively and repeatedly seeking, detecting, and isolating threats escaping from existing security solutions within a network or dataset. Implementing robust defense strategies helps reduce the risk of cyber threats in the early stages of an attack. As part of this strategy, threat detection enables organizations to detect anomalous behavior and find unknown threats that succeed in evading technology-based controls.WatchGuard’s research with Pulse on IT leaders’ approaches to threat attacks shows that 53 of participants are continuing their preparations for threat hunting into 2023. Yusuf Evmez, country manager of WatchGuard Turkey and Greece, underlined that continuous monitoring and threat hunting is very important for IT leaders and said that according to the survey results, 96 of the participants responded that continuous monitoring and threat hunting should be one of the most important security initiatives. but that companies he states that only 3 of them have this level of maturity at this point.
Only 3 companies have a threat hunting maturity level!
Yusuf Evmez argues that the key point required for threat detection is advanced technology infrastructure, and states that the results of the study support this view. Evmez shared that only 3 of the companies’ technology infrastructures are capable of detecting threats. It gives the information that it has not successfully executed the threat hunt due to tools or technological limitations. In an enterprise network where traditional cybersecurity solutions are used, cybersecurity alert evaluation systems, query-based log management systems, Intrusion Detection System (IDS/IPS) for network security, Security Information and Event Management (SIEM) for centralized log collection and correlation processes, both solutions as different software and techniques are used. While these solutions are used to increase system security, cyber attacks are increasing day by day.
Security Skills Required for Successful Threat Hunt
The WatchGuard and Pulse report provides an in-depth analysis of the imbalance between state-of-the-art threat hunting in companies and their internal maturity and capabilities in the discipline. According to the results of the survey, more than half of IT leaders consider insufficient security skills to be the main reason for technology barriers. “SIf it takes a long time for cyber-attacks to be noticed, your security skills are considered insufficient.” Yusuf Evmez also notes in his statement the need to engage in threat hunting to prevent or minimize the damage experienced when considering a sophisticated, targeted cyberattack. In this way, according to Evmez, attacks can be detected faster and incidents can be responded to more quickly.
Source: (BHA) – Beyaz News Agency
Source: Haber Safir
I’m Sandra Torres, a passionate journalist and content creator. My specialty lies in covering the latest gadgets, trends and tech news for Div Bracket. With over 5 years of experience as a professional writer, I have built up an impressive portfolio of published works that showcase my expertise in this field.