Agile Security for Today’s Remote Work Environments

Agile Security for Today’s Remote Work Environments

Expect the unexpected is perhaps one of the many would-be mottos fit for today’s security groups. Teams are faced with constant change, both in terms of threats they constantly face and their own infrastructure and resources that need protection. While much has been written on the tremendous change driven by the pandemic, the conditions are nothing new to security practitioners. Even the degree to which companies have shifted their workforce from on-site to remote does not represent a novel challenge to security teams, given that many companies had already embraced the idea of mobility and a work-from-anywhere workforce.

While dynamic change has been the reality for some time, few security groups are able to stay ahead or even keep up with its rate. Most teams admit that they are primarily reactive, if only because of the immense challenges they face. In general, teams are overworked and understaffed. At the same time, being a defender makes the odds of success small compared to those attackers have. Attackers essentially have the advantage of first-mover strategy and unlimited creativity of compromising a company’s network or assets and they only need to be successful with one of them, while defenders must successfully defeat every attempt, every time to remain secure.

Fortunately, security technologies and tools are constantly improving. Practices and strategies are maturing and evolving as well. One added capability could provide game-changing effectiveness to security teams to help shift challenges and boost the odds of success. Agility for security is emerging as a concept that is both crucial and decisive. In the whitepaper, New Security Realities Demand Next Generation Visibility, Zeus Kerravala, principal analyst, ZK Research, notes, “For most organizations, it’s very difficult to deploy new security technologies or rip and replace older ones. Doing so potentially disrupts the current environment and requires extensive steps and approvals.” Security organizations must change this dynamic to ensure that they can take advantage of the latest advances in technology to help combat threats and challenges.

Agility for security involves multiple aspects. The obvious one is the speed at which one can adapt new solutions and procedures and put them into place to gain advantages or satisfy needs. Another aspect revolves around whether infrastructure, policies and politics actually work against the security team by making any proposed change a difficult, time-consuming process that adds to already staggering workloads. Such conditions become a discouragement for teams to want to change. They impact morale and ensure that security solutions will often be out of date or not fully optimized.

When you think about it, the idea of agility is already part of DevSecOps and SecOps strategies. Both of these disciplines embrace the concept of easing the process of getting things done and reducing the amount of friction involved. They also are designed to solve issues early or to become more proactive in preventing problems by adding in security considerations into designs or by providing greater operational efficiency.

Operational efficiency enables security teams to focus on what is truly important - finding an attack early and cutting off the threat to minimize any theft or damage, or to shore up significant vulnerabilities. Too much time is consumed by wild goose chases of false positive alerts and items that are relatively unimportant. Too much time is also taken by processes and constraints that make the work of security more difficult and less efficient. By becoming efficient, security teams can become more effective. Expanding remote work conditions, evolving cloud infrastructure and dynamic threats and challenges all require greater efficiency and effectiveness for security teams to remain successful. Security agility ensures that security teams are ready.

About the Author

Zeev Draer serves as vice president of corporate strategy at Niagara Networks.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3