ITPro Today: CISOs Take Note: Is Needless Cybersecurity Strangling Your Business?
While it may seem like adding more tools to your enterprise’s security stack inherently strengthens protection, that’s not always necessarily the case.
ITPro Today featured insights from NetSPI CEO Aaron Shilts in an article that challenges this assumption. The piece explores how outdated and redundant cybersecurity tools can actually create operational headaches – leading to alert fatigue, delayed incident response, and even dangerous blind spots in threat detection. In today’s fast-evolving threat landscape, it’s crucial that companies regularly audit their security stack to ensure tools are complementary, current, and truly effective. Read the preview below or view the full article online that addresses how – when done right – less can be more.
+ + +
There can never be too much cybersecurity, right? Wrong, says Jason Keirstead, vice president of security strategy at AI security developer Simbian. “Cybersecurity is not always a place where more is better,” he observes in an online interview. “Having redundant tools in your security stack, duplicating functions, can create increased churn and workloads, causing security operations center analysts to deal with superfluous, unnecessary alerts and information.”
The problem can grow even more serious if a tool is redundant because it’s outdated . . . Additionally, outdated tools can directly affect employees, hampering organizational productivity.
Aaron Shilts, president and CEO of security technology firm NetSPI, agrees. “For IT and security teams, redundant and obsolete security tools or measures increase workflows, hurt efficiency, and extend incident response and patch time,” he explains via email.
You can read the full story here.
Authors:
Explore More News
Proof Over Promises: A New Doctrine for Cybersecurity
As cyberattacks grow in frequency and sophistication, traditional assurances like contracts and certifications are no longer sufficient. Instead, vendors must actively demonstrate their security resilience through measurable and continuous validation, such as penetration testing. This proactive approach not only strengthens vendor-customer relationships but also mitigates risks in an increasingly interconnected and vulnerable digital landscape.
The Age of Promises is Over, Vendors Must Now Lead with Evidence-Based Assurances
In today’s evolving cyber threat landscape, traditional vendor assurances like contracts and periodic audits are no longer sufficient. Sam Kirkman emphasizes the need for vendors to shift from trust-based compliance to evidence-based security, where measurable and continuous validation replaces outdated promises.
NetSPI Redefines Pentesting with New User Experience
NetSPI, the global leader in modern penetration testing, today announced a new, modern user experience for the NetSPI platform, reimagining what penetration testing should feel like for today’s enterprise: focused, fast, and easy.