Security at Scale—With Great Success Often Comes Great Security Problems

Security at Scale—With Great Success Often Comes Great Security Problems

Some common areas and issues to keep growing your business, not your security risk.

All businesses want to become the next big thing, but with great success often comes greater security issues. How does a company scale for growth without becoming a security risk? What are the best things to do to maximize efficiencies, and to properly scale your security practice? 

Here are some common areas and issues to keep growing your business, not your security risk.

Plan for Growth

Always design your security architecture so that it can scale as needed. Ensure that network maps and asset inventories are correctly maintained and are easy to access by the security team. There’s nothing more frustrating than to be in the middle of an incident and your team is struggling to identify what data is on which machine and who is responsible for it.

Operations

Anyone who has run any sort of security group of any size knows that having a well planned out operations groundwork is critical to any sort of effectiveness. Formal run books, incident response plans, formal procedures for commonly encountered issues, and so on. When a machine gets popped with ransomware, who is on the hook to remediate, and who does the investigation to find the root cause? As your company grows, so will the security team’s reliance on other teams like networking and IT. Ensure that you integrate and train them on your processes, so that not only do incident responses run more smoothly, but the teams learn to work together. Having a great relationship with the actual boots on the ground can be priceless, especially when the you know what hits the fan.

Automation

Once you start to scale your network, you can be pretty much assured that your security team and resources won’t scale as quickly. This usually means that you need to lean on automating as many tasks as possible. For example, if you require new passwords frequently, with a million plus users, you had better have an automated way to handle password resets. Self-serve processes are great, but as always, ensure that any scripts or services you deploy are secured – especially if they are handling sensitive tasks.

Wherever possible automate patching, automate scanning, and implement an effective remediation assignment and tracking. Let’s be honest. Any IT organization that isn't good at automation will fail badly at scale, no matter what it is, security or not.

Proper Monitoring

Proper security monitoring can encompass a lot of things Host IDS, FIM, end-point security, network IDS, threat intelligence and so on.

  • Monitoring the appropriate traffic with the proper people is critical. Don’t deploy kids fresh out of school in the Security Operations Center (SOC). Make sure there is at least one pair of experienced eyes looking at alerts. Too often SOC analysts, through lack of experience, will flag individual incidents as minimal, while not recognizing they are part of a concerted attack. 

  • Ensure that you have logs from everything, and that outages are remediated quickly. Don’t just focus on external traffic – focus as much energy on detecting anomalous internal traffic for signs of employees poking around where they shouldn’t be, as well as possible breaches.

  • As you scale, consider using honeypots. These can attract attackers, and when properly configured can yield extremely valuable information.

  • Wherever possible, ensure that local logs are monitored; too many organizations focus on general network traffic, ignoring local logs. The result is often compromised machine going undetected for a long while

  • Ensure that all important sources of threat intelligence are being centralized so that your SOC analysts can get a big picture view.

Reduce the Noise

Reducing the noise is perhaps the most critical change one can make to their network. Too often the approach of security teams to false positives is to tune them out at the SIEM and move on. There’s a big problem with this approach. First, there’s unnecessary traffic traversing the network and in the logs, but more important, the underlying issue isn’t being addressed. The best approach is to remediate, limit, then filter. 

Remediate is the preferred approach; actually fix what’s making noise. This plays into the operations part above; as you grow, make sure your incident response plans include IT and networking. When you see a machine innocuously repeatedly trying to reach a service that it is blocked to, have IT investigate and fix it. This is also an opportunity for the security team to illustrate to the IT and networking groups that security can be an effective adjunct to their teams, identifying broken systems well before their groups will.

If the false positives can’t be remediated, wherever possible, block the alerts at the source. This limiting of unnecessary traffic will ease your analyst load, and will help reduce the traffic being thrown into your security logs and appliances. Finally, if you are unable to remediate or limit the traffic, filter it at the SIEM, but not until you’ve exhausted the first two option.

Reducing the noise isn’t just limited to reducing unneeded network traffic; it’s important that things like threat intelligence feeds are also fine tuned to your environment. If you don’t run Apache, your analysts don’t need to be seeing any of those intelligence alerts in their inbox. Your end goal should be to minimize the hay, making the needles much more apparent.

No matter your organization’s size, if you follow these basic concepts, your security processes should run more smoothly, and growth will not be an issue. A little pain when you are small is much better than a lot more pain down the road.

Featured

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

  • UK’s NHS Hospital Transforms Security with Edge-processing Camera System

    i-PRO Co., Ltd.,(formerly Panasonic Security), a manufacturer of edge computing cameras for security and public safety, recently announced that a leading teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). Read Now

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities