
Understanding The Challenges Of Cybersecurity Threat Readiness
The importance of keeping an organization's data safe can't be overstated. According to Thomson Reuters, just one data breach can cost a company millions—with no sign of that cost decreasing. Effective threat readiness helps reduce the risk of falling victim to cybercriminals and paying a staggering sums to address the damage. But before security operations center (SOC) analysts can prevent attacks, organizations must first understand the core challenges to becoming truly threat-ready.
Common Threat Readiness Challenges
Threat readiness means being able to identify, prepare for and respond to cybersecurity threats. While all organizations should be concerned, there's no one-size-fits-all approach to staying secure. It's critical to develop methodologies tailored to each organization's specific needs and security landscape.
The first challenge in becoming threat-ready is identifying which threats matter the most. It's unrealistic to try to combat every attacker, every time. An intel-driven approach can help focus resources on high-priority threats—but leaders need to determine which ones are worth the focus.
Simulation scenarios must be relevant to a company's sector and geography. Threat actors often target based on industry, region or past vulnerability. For instance, an attacker focused solely on Sri Lanka, Bangladesh and Pakistan is likely irrelevant to a Texas-based tax software company.
SOC teams should also track which threat groups have targeted them in the past. Getting breached once is forgivable—but being breached twice by the same actor can have serious professional consequences.
By building profiles of likely attackers, cybersecurity teams can define the relevant actors, tactics and motivations, then design defenses that address them. While it may feel safer to respond to every threat, doing so wastes time and resources. Unless your organization has infinite budget, it's better to focus than overreact.
'Plumbing' refers to the behind-the-scenes effort of filtering, applying and managing security data effectively. SOCs are innundated with information—thousands of indicators, alerts and threat group signatures. Without good plumbing, teams can drown in a flood of false positives or irrelevant data.
Improper filtering can not only trigger irrelevant alerts, it can also cause outages in network or endpoint infrastructure—potentially obscuring real threats amid the noise.
Blocking threats is a central goal, but automating this action introduces risk. Automatically blocking infrastructure based on threat intelligence may inadvertently disrupt employee access to legitimate applications.
For example, some threat actors use trusted services—like obscure file-sharing platforms or even Google Calendar—for command and control. APT41 has used this exact tactic. If you block infrastructure flagged in threat intel without vetting, the outages you cause could be worse than the threats themselves.
Confidentiality is a cornerstone of effective threat readiness—but it's harder to maintain when integrating AI into workflows. AI can help analysts manage large volumes of data, but feeding sensitive information into third-party systems raises privacy concerns.
Organizations should be cautious when uploading alert data into AI platforms like OpenAI or Google Gemini. These companies have legitimate access to user input, and while their analysts are skilled professionals, they openly publish threat intel on their public blogs—indicating that customer data may be actively reviewed.
When a data breach is suspected, especially in regulated industries, SOCs must act quickly—while also following strict protocols. Investigations need to be trackable and auditable to ensure clarity later.
If an analyst investigates a breach involving a senior executive, they must document every step. Without clear records, actions like pulling files or accessing email accounts can raise internal or legal concerns and may reduce trust in future automation.
Getting Ahead Of The Threat Curve
Navigating threat readiness challenges requires a strategic blend of human expertise, actionable intelligence and smart automation. Rather than adopting generic security frameworks, companies should build comprehensive, adaptable programs that reflect their unique threat landscape and operational priorities.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
5 hours ago
- Yahoo
Qualys (QLYS) Wins Two Pwnie Awards at DEF CON for Groundbreaking OpenSSH Vulnerability Research
Qualys, Inc. (NASDAQ:QLYS) is one of the Qualys, Inc. (NASDAQ:QLYS) is one of the best midcap AI stocks to buy right now. On August 12, 2025, Qualys announced that its Threat Research Unit (TRU) received two Pwnie Awards at the DEF CON cybersecurity conference for its groundbreaking work uncovering critical OpenSSH vulnerabilities. The awards, 'Epic Achievement' and 'Best Remote Code Execution (RCE)', recognized Qualys for identifying CVE-2024-6387, the first pre-authentication RCE in OpenSSH in nearly two decades, and CVE-2025-26465, a man-in-the-middle attack affecting FreeBSD clients. The wins cement Qualys' status as a major player in vulnerability research. welcomia/ Alongside its ongoing threat research, Qualys expanded coverage within its Enterprise TruRisk Platform on August 12, 2025, issuing new vulnerability checks tied to Microsoft's latest Patch Tuesday update. While the company did not publish a formal press release, its research portal listed 98 vulnerabilities across 12 Microsoft security bulletins, with immediate support deployed for customer environments. The update underscores Qualys' operational emphasis on rapid detection and remediation, reinforcing its reputation for delivering same-day protections aligned with major vendor disclosures. Qualys is a U.S.-based provider of cloud-native IT, security, and compliance solutions. Its platform is used by global enterprises to manage vulnerabilities, ensure policy compliance, protect against threats, and inventory digital assets across hybrid environments. While we acknowledge the potential of QLYS as an investment, we believe certain AI stocks offer greater upside potential and carry less downside risk. If you're looking for an extremely undervalued AI stock that also stands to benefit significantly from Trump-era tariffs and the onshoring trend, see our free report on the best short-term AI stock. READ NEXT: and . Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
5 hours ago
- Yahoo
SentinelOne (S) Expands Mimecast Partnership to Advance Human-Centric Cybersecurity
SentinelOne, Inc. (NYSE:S is one of the SentinelOne, Inc. (NYSE:S) is one of the best midcap AI stocks to buy right now. On August 6, 2025, SentinelOne announced an expanded partnership with Mimecast to advance human-centric cybersecurity. The integration connects SentinelOne's Singularity™ Platform with Mimecast's Human Risk Management (HRM) solution, enabling enterprises to correlate endpoint telemetry with behavioral insights and email-based threat intelligence. The goal is to strengthen real-time detection, automate risk scoring, and deliver targeted awareness training based on individual user behavior. Den Rise/ This collaboration marks a shift toward more adaptive, user-aware security frameworks. By analyzing how people interact with their environments, through devices, apps, and communications, the combined solution helps identify at-risk users and prioritize them for intervention. SentinelOne's AI-driven endpoint protection feeds into Mimecast's analytics to uncover patterns of risky behavior, enhancing both detection and prevention efforts. SentinelOne is a California-based cybersecurity company that provides autonomous endpoint protection, cloud security, and identity threat detection through its Singularity™ Platform. The company employs artificial intelligence and machine learning to deliver real-time threat prevention, detection, and response at machine speed. While we acknowledge the potential of S as an investment, we believe certain AI stocks offer greater upside potential and carry less downside risk. If you're looking for an extremely undervalued AI stock that also stands to benefit significantly from Trump-era tariffs and the onshoring trend, see our free report on the best short-term AI stock. READ NEXT: and .
Yahoo
8 hours ago
- Yahoo
Customers Could Receive up to $7,500 in AT&T Settlement
Recent data breaches at AT&T could prove to be extremely costly for the company. The telecommunications giant will be paying millions to customers as part of a class action settlement, and some customers could receive thousands. The Kroll Settlement Administration says that in 2024, customers had their sensitive information leaked on the dark web. This breach in March included addresses, social security numbers, birthdates, passcodes, billing numbers and phone numbers. Another breach later that year in July compounded the issue. In that instance, more customer data was collected, including call logs for individual customers. The settlement website says that customers can submit a claim by Thursday, November 18. If they submit documents that prove they were affected by the data breaches, they could receive up to $5,000. Additionally, those who had their Social Security numbers leaked as part of the first data breach can apply for a tiered payout system. Tier one in that system is five times higher than tier two's amount. Customers who were affected in the second data breach could also be eligible for up to $2,500, putting the total payment for customers at as much as $7,500. Back in 2024, the AT&T data breaches were noted as a significant lapse in cybersecurity, putting thousands of customers at risk of having their identities or finances compromised. 'These are incredibly sensitive pieces of personal information and, when taken together at the scale of information that appears to be included in this AT&T breach, they present a massive NSA-like window into Americans' activity,' said University of Toronto researcher John Scott-Railton about the breach. Scott-Railton called the hack a "megabreach" in an interview with CNBC, and other experts agreed that the amount of sensitive information involved was severe. 'If you have somebody's metadata, you know when they go to work, where they go to work, where they sleep every night,' said Thomas Rid, professor in the cybersecurity studies institute at Johns Hopkins. In total, AT&T is expected to pay $177 million to customers as a result of the settlement. As the end of the year and the deadline to file approaches, we'll see if those predictions turn out to be accurate. Customers Could Receive up to $7,500 in AT&T Settlement first appeared on Men's Journal on Aug 14, 2025 Solve the daily Crossword