Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Zero to One Security Innovation

The increasing volume and sophistication of cyberattacks over the last few years has resulted in millions of dollars of investments in new cybersecurity startups, in more and more security tools created by cybersecurity companies and in huge investments in these new security solutions by enterprises.

The increasing volume and sophistication of cyberattacks over the last few years has resulted in millions of dollars of investments in new cybersecurity startups, in more and more security tools created by cybersecurity companies and in huge investments in these new security solutions by enterprises.

To try get a handle on all these new tools, enterprises have needed to invest in more and more security employees to deploy, manage and analyze security data being generated –creating what we call a “big data problem.” An enormous investment in time and money managing these growing security forces naturally followed.

Although some will not admit it, these investments have by and large generated chaos where we need clarity and clumsiness where we need agility.

Although all security vendors and service providers are trying to innovate and develop new solutions that are more successful thwarting advanced threats, if we look at the success rate of attackers vs. dollars spent by the defenders, it seems that attackers are still innovating at a faster pace – the mouse seems to be scurrying faster than the cat in this cat and mouse game. 

new security tools and features represent incremental innovation, not paradigmatic changes.

Here’s the crux of the problem: new security tools and features represent incremental innovation, not paradigmatic changes. True innovation in cybersecurity would mean a “zero to one” change, or, in others words, a real “value innovation.” 

A true value innovation in the today’s cybersecurity arena should include three things: 

• Simplicity in a world of complex, slow and static defense architectures 

• A nimble, adaptive and programmable security apparatus (as opposed to a new product or product improvement)

• The ability to utilize crowd intelligence seamlessly 

Zero to one innovations would entail that defenders put the cat ahead of the mouse, i.e. create security solutions faster than the attackers do, independent of security vendors.

In today’s market, more does not mean better. We need innovation that makes more of what the industry already has by turning what we have into what we need.

One key to achieving zero to one innovation can be found in “Security Abstraction.” 

When a system reaches a certain level of complexity, it needs to be simplified in a way that will allow it to scale.  Systems become convoluted when they include many components with different capabilities, speak in different languages, and are integrated with each other in complicated ways. Abstraction is a key capability required for simplifying this complexity and enabling this type of scalability. 

A few very successful examples of how abstraction technologies from other industries helped include smartphone operating systems (i.e., Android, IOS) that in just 5-6 years transformed the entire industry by simplifying the development of apps (which are often very complex); website design platforms which enabled advanced websites to be created simply (i.e., Wix); and SDDC (software defined data centers) platforms that abstract networking components in order to simplify them, creating smarter networks with more business value. 

The bottom line: less is more. Security abstraction can simplify existing security infrastructure, allowing it to be much more flexible, adaptive and quick to react against any type of attack, making sure that in this perennial cat and mouse game, the mouse, aka the hackers, will ultimately be the losers.  A zero to one innovation!

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Security Architecture

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Incident Response

Implementation of security automation can be overwhelming, and has remained a barrier to adoption

Application Security

Vulnerability researchers at Google Project Zero are calling attention to the ongoing “patch-gap” problem in the Android ecosystem, warning that downstream vendors continue to...