While it may seem like adding more tools to your enterprise’s security stack inherently strengthens protection, that’s not always necessarily the case. 

ITPro Today featured insights from NetSPI CEO Aaron Shilts in an article that challenges this assumption. The piece explores how outdated and redundant cybersecurity tools can actually create operational headaches – leading to alert fatigue, delayed incident response, and even dangerous blind spots in threat detection. In today’s fast-evolving threat landscape, it’s crucial that companies regularly audit their security stack to ensure tools are complementary, current, and truly effective. Read the preview below or view the full article online that addresses how – when done right – less can be more. 

+ + + 

There can never be too much cybersecurity, right? Wrong, says Jason Keirstead, vice president of security strategy at AI security developer Simbian. “Cybersecurity is not always a place where more is better,” he observes in an online interview. “Having redundant tools in your security stack, duplicating functions, can create increased churn and workloads, causing security operations center analysts to deal with superfluous, unnecessary alerts and information.”  

The problem can grow even more serious if a tool is redundant because it’s outdated . . . Additionally, outdated tools can directly affect employees, hampering organizational productivity.  

Aaron Shilts, president and CEO of security technology firm NetSPI, agrees. “For IT and security teams, redundant and obsolete security tools or measures increase workflows, hurt efficiency, and extend incident response and patch time,” he explains via email. 

You can read the full story here.