- Home >
- Services >
- Access to Knowledge >
- Trend Monitor >
- Type of Threat or Opportunity >
- Trend snippet: Defending enterprises against modern cybercriminals — who are plentiful, well-resourced, persistent and endlessly inventive — has never been an easy task.
Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
Defending enterprises against modern cybercriminals — who are plentiful, well-resourced, persistent and endlessly inventive — has never been an easy task.
them easy to understand and use to drive action—it will finally be possible for security teams to gain the upper hand over attackers.
2020’s events, including theglobal coronavirus pandemic, the sudden and unexpected shift to
remote work and a dramatic acceleration in the growth of the digital economy, have multiplied the challenges that security programs face. In today’s world, cybercrime is big business: Damages inflicted by cybercriminals are predicted to cost victims $6 trillion globally in 2021, according to Cybersecurity Ventures. Losses from cybercrime are exponentially larger than the costs associated with natural disasters, and they are said to be more profitable on a worldwide scale than the entirety of the illegal drug trade. This continues to be the case even though defenders have access to more tools, technologies and data than they’ve ever had in the past. Network telemetry and monitoring infrastructures are more comprehensive, automated solutions are more sophisticated, threat intelligence feeds are more plentiful, and security operations (SecOps) teams are collecting and aggregating more log data. But these technological advances haven’t turned the tide in the war against cybercrime. In fact, maintaining an effective enterprise security program is more challenging than ever. According to research conducted by the Ponemon Institute, past a certain point, organizations with more tools are actually less able to detect
and respond to attacks than those running fewer solutions. The average enterprise now maintains 45 distinct security technologies. Organizations with 50 or more tools rank 8% lower in their ability to detect an attack and 7% lower in their ability to respond to an attack than organizations with fewer than 50 tools.
What factors account for this diminishing return on investments in cybersecurity? In large part, it’s due to information overload. Having more tools means that cybersecurity practitioners confront more data, alerts and events, many of which are false positives. They won’t necessarily have a better view of the environment. They won’t have a more accurate understanding of the threat landscape in which the business operates, or a firmer grasp on how to prioritize their time and attention.
Contemporary security programs are invariably resourceconstrained, particularly when it comes to the time and attention of
experienced professionals. With more than 3.1 million cybersecurity positions unfilled worldwide, according to (ICS)2, it’s vital that lean teams understand how to direct their efforts where they’ll have the biggest impact. To do so, they’ll need to recognize which information is most worthy of their attention —what is signal and what is noise. Statistician and election forecaster Nate Silver has written, “In less than a second, we humans are producing the equivalent of the amount of data that the Library of Congress has in its entire print collection. But most of it is [useless]. Distinguishing the signal from the noise requires both scientific knowledge and self-knowledge.”