By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: One More Tool Will Do It? Reflecting on the CrowdStrike Fallout
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > One More Tool Will Do It? Reflecting on the CrowdStrike Fallout
Tech News

One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

By Viral Trending Content 6 Min Read
Share
SHARE

Sep 09, 2024The Hacker NewsData Protection / Threat Detection

Contents
The limitations of cybersecurity toolsWhen the net is not positive: The hidden dangers of adding another toolSimplifying the chaos with a unified platform

The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are adequately protected. However, this approach not only fails to address the fundamental issue of the attack surface but also introduces dangerous third-party risk to the mix.

The world of cybersecurity is in a constant state of flux, with cybercriminals becoming increasingly sophisticated in their tactics. In response, organizations are investing heavily in cybersecurity tools, hoping to build an impenetrable fortress around their digital assets. However, the belief that adding “just one more cybersecurity tool” will magically fix your attack surface and enhance your protection is a dangerous misconception.

The limitations of cybersecurity tools

Cybersecurity tools, while essential, have inherent limitations. They are designed to address specific threats and vulnerabilities, and they often rely on signature-based detection, which can be easily bypassed by zero-day attacks. Moreover, tools can generate a deluge of alerts, overwhelming security teams and making it difficult to identify genuine threats. According to this Gartner survey, 75 percent of organizations are pursuing vendor consolidation. The number one reason cited? Reducing complexity.

Furthermore, tools often operate in isolation, creating silos of information that hinder effective threat detection and response. Without a holistic view of the attack surface, organizations remain vulnerable to attacks that exploit gaps in their defences.

When the net is not positive: The hidden dangers of adding another tool

Ironically, each new cybersecurity tool you add to your arsenal can inadvertently expand your attack surface by introducing third-party risk. Every vendor you engage with, from cloud service providers to software developers, becomes a potential entry point for cybercriminals. Their own security practices, or lack thereof, can directly impact your organization’s security posture. A data breach at a third-party vendor can expose your sensitive information. A vulnerability in their software can provide a backdoor into your network. This complex web of interconnected systems and dependencies makes it increasingly challenging to manage and mitigate third-party risks effectively. We saw this play out in the Sisense breach, where customers trusting a third-party had their credentials stolen – an incident strong enough to prompt a CISA warning.

And let’s remember the CIA-triad of cybersecurity: confidentiality, integrity and availability. Losing availability is equally damaging to the business, independent of the root cause: outages caused by security tools and outages resulting from a DOS attack are equally harmful. And we saw from the CrowdStrike outage that security tools can and do inflict serious damage. This impact is due to the preferential access these tools get to your systems: in the case of CrowdStrike, it gets kernel-level access to every endpoint to ensure full visibility. Incidentally, this same deep access made the Falcon platform outage so incredibly devastating and made remedial efforts expensive.

This is true for almost all IT security products. Your tool designed to mitigate the risk has the potential to take down the systems it’s intended to protect. Your firewall misconfiguration can take down your network, your email spam filter can take down your email communication, and your access control solution can lock out your frontline workers – the list goes on. And while these tools vastly improve the security posture of the organization, customers should look to strike a balance between adding third-party risk from the software supply chain and mitigating risk with every new tool.

Simplifying the chaos with a unified platform

The danger arises from the complexity we mentioned above. This is now seen as the single biggest challenge in cybersecurity, motivating customers to move to larger, unified platforms in SASE and XDR – according to the cited Gartner survey – but also in identity security. Analysts are pushing customers towards identity fabrics and unified identity for this exact reason: it reduces complexity and brings together disparate tools in a pre-validated, pre-integrated manner. It’s no surprise that every identity vendor is touting their “unified suite,” regardless of its state, the actual benefits it offers customers or whether it truly has the potential to unify the customer’s entire internal identity landscape.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

New Dungarvan & West Waterford Gift Card launched

Gemini 3 vs GPT-5 Pro: Coding, Math, Benchmarks & Creative Tests

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

‘Powerful AI is now changing what it means to be good at your work’

OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore

TAGGED: Cyber Defense, Cyber Security, Cybersecurity, data protection, Digital Security, Information security, Internet, IT security, Risk management, threat detection
Share This Article
Facebook Twitter Copy Link
Previous Article Princess Kate completes chemotherapy, set to return to public duties
Next Article Kate Middleton’s Health: Princess Confirms She Is ‘Cancer Free’ After Finishing Treatment
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

The Jets are benching Justin Fields and will start Tyrod Taylor in Week 12 vs. the Ravens
Sports
Bitcoin Capitulation Intensifies: 65,000 BTC Sent To Exchanges At A Loss
Crypto
Amazon’s TV Soundbar Gets Double Price Cuts in Just Days, Now Going for Pocket Change
Gaming News
LoHi restaurant blames local contractors for sewage deluge, long closure
Business
New Dungarvan & West Waterford Gift Card launched
Tech News
Ukraine signs deal with France for 100 Rafale jets and air defence systems
World News
Future with U: Phemex celebrates its 6th anniversary with 66% user growth and shared vision
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

The Jets are benching Justin Fields and will start Tyrod Taylor in Week 12 vs. the Ravens

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
The Jets are benching Justin Fields and will start Tyrod Taylor in Week 12 vs. the Ravens
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?