Sunday, June 26, 2022
  • CommitStrip ‘The Right Tool For The Right Job At The Right Time?’
  • USENIX Enigma 2022 – Chloé Messdaghi’s ‘Burnout And PCSD: Placing Team At Risk’
  • Elevating Privileges with Authentication Coercion Using DFSCoerce
  • USENIX Enigma 2022 – Ram Shankar Siva Kumar’s ‘Why Has Your Toaster Been Through More Security Testing Than The AI System’
  • XKCD ‘Roman Numerals’

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Network Security Security Bloggers Network 

Home » Cybersecurity » Network Security » The Top 10 Network Security Challenges in 2019

SBN

The Top 10 Network Security Challenges in 2019

by ironcore on January 22, 2019

Most security professionals say network security is harder this year when compared to last year – according to a survey we recently conducted. When asked “why?” respondents pointed to a range of challenges.

Some of those included the following:

DevOps Connect:DevSecOps @ RSAC 2022
  • “Increase in threats from third-party networks and IoT devices.”
  • “Hackers are using more complex and comprehensive tools and internal users seemingly are less aware of what they do to reduce protection.”
  • “More things keep getting added to the network, with more vulnerabilities.”

Clearly, some challenges bear more weight than others and we aimed to quantify or rank which concerns security professionals deemed most important. When presented with a list of well-defined problems in network security, respondents identified the top challenges as follows:

1) Insider threats – 44%
2) IT infrastructure complexity – 42%
3) Absence of leader support – 40%
4) Lack of tool interoperability – 37%
5) Shadow IT – 31%
6) Weak controls for provided access – 29%
7) Cloud visibility – 28%
8) BYOD – 26%
9) Too many alerts – 22%
10) Too many tools – 18%

While “insider threats” ranked as the top challenge, in our assessment, and considering the entire survey and comments from respondents, these are not necessarily malicious. Instead, this category likely includes accidental incidents set off by well-intended users inside the network.

It’s important to note that no single challenge drew a majority of responses. This underscores the diversity of problems facing network security which can vary by industry, IT environment and perhaps organizational culture.

3 Ways to Address Some of the Top 10 Network Security Challenges

The diversity of challenges reinforces the notion that there isn’t a single solution that will solve every security problem. However, there are reasonable steps security leaders can take as part of an overall layered security posture.

1) Segment your network.

Insider threats are a good reason to segment your network and protect sensitive data from both malicious and accidental events. Instrument those segments with comprehensive threat detection deployed at a central point. Look for modern technologies that include stateful anomaly detection to identify suspicious behaviors. In addition, be sure to adjust detection rules and policies to accommodate for the variations in traffic behavior you are likely to see from internal vs. external threats.

Also see: Layers of Cybersecurity: Signature Detection vs. Network Behavioral Analysis

2) Bring context to alerts.

A key challenge with security alerts is the overwhelming volume. The survey showed the deluge of alerts can exceed the capacity of security teams: they can’t investigate them all. A solution is to look for tools that provide ways to filter and prioritize alerts based on your unique environment. Tools that enable security to correlate network metadata directly with alerts brings to bear context that reduces time-to-detection and minimizes false positives.

Also see: How Many Daily Cybersecurity Alerts does the SOC Really Receive?

3) Cybersecurity integration and data interoperability.

The fourth and tenth challenge on the list – too many tools and data interoperability – are closely related. Our analysis of the data suggests it’s not so much that organizations have too many tools, it’s that some tools make it difficult to share data. This requires security analysts to switch from one console to the next to detect threats, which is a manual and time-consuming task. More importantly, manual efforts invite human error and gaps for adversaries to exploit. Look for cybersecurity tools that openly embrace integration and provide ways for analysts to share data and get greater visibility of the network and potential threats.

Also see: 3 Reasons Why the Integration of Cybersecurity Tools is a Growing Imperative

* * *

The Bricata platform provides full spectrum threat detection and can, in fact, help with all the suggestions above and much more. If you’d like to learn more, be sure to check out our 90-second explainer video or request a live demonstration.

Separately, the full survey report – The Top Challenges in Network Security for 2019 – is freely available to view or download on SlideShare. We’d welcome your questions, comments and suggestions about the survey so please feel free to contact us or share your ideas with us on Twitter: @BricataInc.

If you enjoyed this post, you might also like:
Network Security: Why it’s Harder for Threats to Hide Behavior

 


Recent Articles By Author
  • 6 Ways Modern Threat Detection Keeps the Enterprise Ahead of Cybersecurity Trends
  • Three Triggers Telling You It’s Time to Reconsider Your Network Security Strategy
  • Breaking Down 6 Cybersecurity Salary Surveys: What’s a Security Pro Worth in 2019?
More from ironcore

*** This is a Security Bloggers Network syndicated blog from Bricata authored by ironcore. Read the original post at: https://bricata.com/blog/top-network-security-challenges-2019/

January 22, 2019January 22, 2019 ironcore behavior detection, Blog, network metadata, Network Security, network visibility, security integration
  • ← A Fresh Look On Reverse Proxy Related Attacks
  • How to Handle Negative Thoughts or Emotions at Work →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Machine Learning Tackles Ransomware Attacks
The Million-Dollar Question: To Pay or Not to Pay Ransom?
NSA Wants To Help you Lock Down MS Windows in PowerShell
Implementing Zero-Trust? Don’t Forget About Printers
NIST Sets SSE Framework in Final SP 800-160 Guidance
WordPress Security
NIST SP 800-161r1: What You Need to Know
Is Cyber Breach Insurance part of your Cybersecurity roadmap?
Replace Your SIEM with Neural Net Technology
JumpCloud Named Top-Ranking Software Provider in G2 Summer 2022 Reports 

Upcoming Webinars

Mon 27

AI and ML in Security

June 27 @ 1:00 pm - 2:00 pm
Thu 30

Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines

June 30 @ 11:00 am - 12:00 pm
Jul 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Jul 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Jul 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

NSA Wants To Help you Lock Down MS Windows in PowerShell
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

NSA Wants To Help you Lock Down MS Windows in PowerShell

June 24, 2022 Richi Jennings | 2 days ago 0
Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’
Analytics & Intelligence Application Security Blockchain Cloud Security Cyberlaw Cybersecurity Data Security DevOps Digital Currency Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’

June 21, 2022 Richi Jennings | Jun 21 0
TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage
Careers Cybersecurity Featured News Security Boulevard (Original) Spotlight 

TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage

June 21, 2022 Michael Vizard | Jun 21 0

Security Humor

XKCD 'Roman Numerals’

XKCD ‘Roman Numerals’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected].com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.