Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Misplaced Security Confidence Keeping Organizations at Risk: McAfee

According to new report from McAfee, many organizations worldwide are failing when it comes to leveraging the massive amounts of security data (Big Security Data) they collect on their networks.

According to new report from McAfee, many organizations worldwide are failing when it comes to leveraging the massive amounts of security data (Big Security Data) they collect on their networks.

The short and to the point version of McAfee’s report says that businesses are vulnerable to security breaches due to their inability to properly analyze or store big data. This is backed by responses from the respondents, which show a double-edged sword when it comes to confidence in their existing security posture, and the reality of an actual security event.

Nearly three quarters (73%) of the respondents claimed the ability to assess their security status in real-time. They also noted a high level of confidence in their ability to identify in real-time insider threats (74%), perimeter threats (78%), zero day malware (72%) and compliance controls (80%).

Yet, when it came to discussing actual security events – out of 58% of the organizations that suffered a breach in the last year, only 24% of them said they recognized it within minutes. Further, when it came to actually finding the source of the breach, only 14% claimed the ability to do so in minutes, while 33% said it took about 24-hours; 16% said a week.

McAfee’s report includes a look at 855 incidents, where data loss was confirmed. Of those, 63% took weeks or months to be discovered, but the data loss itself happened within seconds or minutes in 46% of the cases.

“If you’re in a fight, you need to know that while it’s happening, not after the fact,” said Mike Fey, executive vice president and worldwide Chief Technology Officer for McAfee.

“This study has shown what we’ve long suspected — that far too few organizations have real-time access to the simple question ‘am I being breached?’ Only by knowing this, can you stop it from happening.”

“To achieve real-time threat intelligence in an age where the volume, velocity and variety of information have pushed legacy systems to their limit, businesses must embrace the analysis, storage and management of big security data,” McAfee explained. “These ever-growing volumes of events, as well as asset, threat, user and other relevant data have created a big data challenge for security teams.” 

Advertisement. Scroll to continue reading.

To be fair, the study, conducted by market research firm Vanson Bourne for McAfee, included 500 senior IT decision makers in January 2013, including 200 in the USA and 100 each in the UK, Germany and Australia. So the sample set is decent enough to infer that the problem is worth examining, but not large enough to say this is an absolute fact.

A full copy of the report is available here (PDF). If you want a faster read, an infographic of the data is also available here.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Security Infrastructure

XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture