Story image

Automation and human skill imperative for cyber security teams, report finds

24 Jan 2017

Hewlett Packard Enterprise (HPE) recently published its fourth annual State of Security Operations Report 2017, providing analysis on the effectiveness of organisations’ security operations centres (SOCs).

Findings from this year’s report show that the majority of SOCs are falling below target maturity levels, leaving organisations vulnerable in the event of an attack.  

The report has examined nearly 140 SOCs in more than 180 assessments around the globe.

According to HPE, each SOC is measured on the HPE Security Operations Maturity Model (SOMM) scale that evaluates the people, processes, technology and business capabilities that comprise a security operations centre.

With a shortage of security talent, the report shows that the number one concern for security operations is automation and making it a critical component.

However, advanced threats still require human investigation and risk assessments need human reasoning, making it important for organisations to strike a staffing and automation balance.

The report also points out that 82% of SOCs are failing to meet this criteria and falling below the optimal maturity level. 

“This year’s report showcases that while organisations are investing heavily in security capabilities, they often chase new processes and technologies, rather than looking at the bigger picture leaving them vulnerable to the sophistication and speed of today’s attackers,” explains Matthew Hanmer, regional sales director, Security Software, Hewlett Packard Enterprise, South Pacific.

“Successful security operations centres are excelling by taking a balanced approach to cybersecurity that incorporates the right people, processes and technologies, as well as correctly leveraging automation, analytics, real-time monitoring, and hybrid staffing models to develop a mature and repeatable cyber defence program.”

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.