logo
#

Latest news with #SecOps

Angel or Adversary: Deep Instinct Research Highlights the Double-Edged Sword of AI in Cybersecurity
Angel or Adversary: Deep Instinct Research Highlights the Double-Edged Sword of AI in Cybersecurity

Business Wire

timea day ago

  • Business
  • Business Wire

Angel or Adversary: Deep Instinct Research Highlights the Double-Edged Sword of AI in Cybersecurity

NEW YORK--(BUSINESS WIRE)-- Deep Instinct, the preemptive data security company built on the first and only AI-based deep learning framework for cybersecurity, today released the sixth edition of its Voice of SecOps Report, which delves into the growing influence of AI in business, with a focus on its impact on Security Operations (SecOps). While AI adoption is accelerating, the findings uncover a more complex reality: security teams are limited by knowledge gaps, inconsistent implementation, and mounting operational pressures as they face an increasingly treacherous, AI-driven threat landscape. The research, ' Cybersecurity & AI: Promises, Pitfalls​​ – and Prevention Paradise,' found that nearly three-quarters (72%) of organizations have revised their cybersecurity strategies over the past year due to AI, and a whopping 86% have increased their use of AI within SecOps. Despite the investments, two-thirds of respondents were confused about fundamental AI definitions, with 38% unable to differentiate between machine learning and deep learning – signaling an alarming knowledge gap in the industry. Additional key findings from the report include the following: AI-Powered Cyber Threats Drive a Focus on Prevention As cybercriminals build and adopt AI tools, the nature and scale of attacks have drastically evolved and expanded. Nearly half (46%) of organizations experienced an uptick in targeted phishing attacks, while 43% reported deepfake impersonation attempts. Attacks on local or cloud storage were also a growing concern, cited as a top risk by 83% of respondents, second only to phishing (84%). In response to these AI-powered attacks, 82% of organizations say they have shifted toward a prevention-first security strategy, with 64% noting a direct push from the C-suite to adopt more proactive defense measures. Benefits of AI in Cybersecurity Roles Are Clear, Yet It Unexpectedly Contributes to Burnout SecOps teams appear to be reaping the benefits of AI, with 76% stating it makes their roles easier while saving security teams an average of 12 hours per week on manual processes. However, while GenAI may be simplifying some aspects of SecOps workloads, nearly 70% of security professionals believe AI also contributes to burnout. Regulatory complexity adds another layer of strain, with 32% citing difficulties in keeping up with increasing AI-related policies, and an additional 37% fearing AI-related regulations are a financial penalty waiting to happen. Preemptive Data Security: The New Imperative In the face of mounting threats, operational burnout, and AI confusion, preemptive data security – a subset of Gartner's recently introduced preemptive cybersecurity market category – offers a definitive path forward. By harnessing the power of deep learning to prevent threats before they execute, organizations will reduce risk, ease the burden on SecOps teams, and stay ahead of relentless adversaries. 'The traditional 'detect and respond' cybersecurity model is broken – it's reactive, expensive, and no match for AI-powered threats,' said Lane Bess, CEO of Deep Instinct. 'To win this fight, cybersecurity teams must shift from chasing threats to preventing them. Preemptive data security – powered by deep learning, the most advanced form of AI – is the only way for SecOps teams to regain control and stay ahead of adversaries.' To get the full report and download past Voice of SecOps reports, please visit s. Then register for our webinar, Cybersecurity & AI: Promises, Pitfalls – and Prevention Paradise (2025 Voice of SecOps Research), to learn about the top findings from this year's report. Survey Methodology Sapio Research surveyed 500 senior cybersecurity experts from companies with 1000+ employees in the U.S. The interviews were conducted online in April 2025 using an email invitation and an online survey. Respondents worked at organizations that operated in either financial services, technology, manufacturing, retail, healthcare, public sector, or critical infrastructure (such as telecoms, energy, utilities, and transportation). For this specific report, the C-suite is defined as those who hold chief, global, head of department, or director roles, while reports are those who hold a manager, administrator, analyst, team lead, or officer role. About Deep Instinct Deep Instinct, the first and only preemptive data security company built on a deep learning cybersecurity framework, prevents unknown threats in <20 milliseconds, 750X faster than the fastest ransomware can encrypt. Deep Instinct Data Security X (DSX) secures data at-rest or in-motion – across cloud, NAS, applications, and endpoints. DSX Brain, Deep Instinct's deep learning framework, prevents zero-day threats that no one else can find, with >99% accuracy and a <0.1% false positive rate. DIANNA, the DSX Companion, leverages GenAI to provide unparalleled explainability into unknown threats in <10 seconds. For more, visit

CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It
CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It

Business Wire

time22-05-2025

  • Business
  • Business Wire

CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It

NEW YORK--(BUSINESS WIRE)--Headline of release dated May 20, 2025 should read: Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It (instead of RSA Conference Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It). 'Threat intelligence isn't just about collecting data — it's about connecting people, processes, and platforms to act on it," said Anuj Goel, Co-founder and CEO of Cyware. Share The updated release reads: Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well Cyware, the industry leader in threat intelligence operationalization, collaboration, and orchestrated response, today released the results of an onsite survey conducted at RSA Conference 2025. The survey captured insights from 100 cybersecurity executives and professionals across enterprises, government agencies, and service providers about how organizations are operationalizing threat intelligence across their security operations. The findings reveal a sharp disconnect between awareness and action: While nearly all respondents (92%) said collaboration and information sharing are either 'absolutely crucial' or 'very important' in the fight against cyber threats, the data tells a different story when it comes to the adoption of this practice. Only 13% said their current automation between cyber threat intelligence (CTI) and SecOps tools is working well, and nearly 40% struggle to coordinate data across critical security tools like Threat Intelligence Platforms (TIPs), SIEMs, and vulnerability management platforms. 'The RSAC survey data reveals a serious gap between that belief and the operational reality,' said Anuj Goel, Co-founder and CEO of Cyware. 'Threat intelligence isn't just about collecting data — it's about connecting people, processes, and platforms to act on it. These findings reinforce the need for more unified, automated, and collaborative approaches to security operations.' Key survey findings: Internal collaboration and automation maturity remain major gaps: While 92% of respondents said threat intel sharing is 'absolutely crucial' or 'very important,' only 13% said their automation between CTI and SecOps tools is working well. AI optimism is high, but its implementation is still uneven: 78% of respondents believe AI will improve threat intel sharing within their organization, but only 43% say it's made a meaningful impact so far. Threat intel sharing is not occurring in real time: Only 17% of teams share threat intel across roles like SecOps, IR, and vulnerability management in real time, while another 25% do so daily. 22% reported sharing information rarely or not at all. External threat intel sharing collaboration has much room for improvement: While 57% of respondents said their organization collaborates with industry peers to improve threat intel, 30% were unsure if such collaboration even exists. Automation gaps persist: More than half of respondents (56%) reported either significant or moderate challenges automating workflows across CTI and SecOps teams. ISAC participation is low or unknown: Only 18% confirmed that their organization is part of an Information Sharing and Analysis Center (ISAC) or Organization (ISAO), while 45% said they didn't know. That lack of clarity could be limiting access to valuable sector-specific threat insights — and further compounding intelligence silos. The survey results reflect growing urgency to bridge the gap between threat intel awareness and execution. As cyber threats grow more complex and coordinated, Cyware is helping organizations unify threat ingestion, sharing, and response — powered by AI and hyper-automation. To learn how Cyware is helping organizations transform threat intelligence into coordinated defense, visit About Cyware Cyware is leading the industry in operational threat Intelligence and collective defense, helping security teams transform threat intelligence from fragmented data points to actionable, real-time decisions. We unify threat intelligence management, intel sharing and collaboration, as well as hyper-orchestration and automation — eliminating silos and enabling organizations to outmaneuver adversaries faster and more effectively. From enterprises to government agencies and ISACs, Cyware empowers defenders to turn intelligence into impact.

CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It
CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It

Yahoo

time22-05-2025

  • Business
  • Yahoo

CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It

Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well NEW YORK, May 22, 2025--(BUSINESS WIRE)--Headline of release dated May 20, 2025 should read: Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It (instead of RSA Conference Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It). The updated release reads: CYWARE SURVEY REVEALS THAT 92% BELIEVE THREAT INTELLIGENCE IS CRITICAL — BUT MOST ORGANIZATIONS STILL STRUGGLE TO OPERATIONALIZE IT Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well Cyware, the industry leader in threat intelligence operationalization, collaboration, and orchestrated response, today released the results of an onsite survey conducted at RSA Conference 2025. The survey captured insights from 100 cybersecurity executives and professionals across enterprises, government agencies, and service providers about how organizations are operationalizing threat intelligence across their security operations. The findings reveal a sharp disconnect between awareness and action: While nearly all respondents (92%) said collaboration and information sharing are either "absolutely crucial" or "very important" in the fight against cyber threats, the data tells a different story when it comes to the adoption of this practice. Only 13% said their current automation between cyber threat intelligence (CTI) and SecOps tools is working well, and nearly 40% struggle to coordinate data across critical security tools like Threat Intelligence Platforms (TIPs), SIEMs, and vulnerability management platforms. "The RSAC survey data reveals a serious gap between that belief and the operational reality," said Anuj Goel, Co-founder and CEO of Cyware. "Threat intelligence isn't just about collecting data — it's about connecting people, processes, and platforms to act on it. These findings reinforce the need for more unified, automated, and collaborative approaches to security operations." Key survey findings: Internal collaboration and automation maturity remain major gaps: While 92% of respondents said threat intel sharing is "absolutely crucial" or "very important," only 13% said their automation between CTI and SecOps tools is working well. AI optimism is high, but its implementation is still uneven: 78% of respondents believe AI will improve threat intel sharing within their organization, but only 43% say it's made a meaningful impact so far. Threat intel sharing is not occurring in real time: Only 17% of teams share threat intel across roles like SecOps, IR, and vulnerability management in real time, while another 25% do so daily. 22% reported sharing information rarely or not at all. External threat intel sharing collaboration has much room for improvement: While 57% of respondents said their organization collaborates with industry peers to improve threat intel, 30% were unsure if such collaboration even exists. Automation gaps persist: More than half of respondents (56%) reported either significant or moderate challenges automating workflows across CTI and SecOps teams. ISAC participation is low or unknown: Only 18% confirmed that their organization is part of an Information Sharing and Analysis Center (ISAC) or Organization (ISAO), while 45% said they didn't know. That lack of clarity could be limiting access to valuable sector-specific threat insights — and further compounding intelligence silos. The survey results reflect growing urgency to bridge the gap between threat intel awareness and execution. As cyber threats grow more complex and coordinated, Cyware is helping organizations unify threat ingestion, sharing, and response — powered by AI and hyper-automation. To learn how Cyware is helping organizations transform threat intelligence into coordinated defense, visit About Cyware Cyware is leading the industry in operational threat Intelligence and collective defense, helping security teams transform threat intelligence from fragmented data points to actionable, real-time decisions. We unify threat intelligence management, intel sharing and collaboration, as well as hyper-orchestration and automation — eliminating silos and enabling organizations to outmaneuver adversaries faster and more effectively. From enterprises to government agencies and ISACs, Cyware empowers defenders to turn intelligence into impact. View source version on Contacts Media Contact: Jay SmithTouchdown PR for Cywarecyware@

Survey reveals gap between threat intelligence & execution
Survey reveals gap between threat intelligence & execution

Techday NZ

time22-05-2025

  • Business
  • Techday NZ

Survey reveals gap between threat intelligence & execution

A new survey has highlighted a disconnect between the importance organisations place on threat intelligence and their ability to implement it effectively. The research, conducted by Cyware, collected responses from 100 cybersecurity executives and professionals working across enterprises, government agencies, and service providers. Nearly all respondents (92%) described operationalising threat intelligence as either "absolutely crucial" or "very important" in their organisations' efforts to combat cyber threats. Despite this consensus, only 13% of those surveyed reported satisfaction with their automation between cyber threat intelligence (CTI) and security operations (SecOps) tools. The survey also found that nearly 40% of participants experienced difficulty coordinating data between critical security systems such as Threat Intelligence Platforms (TIPs), Security Information and Event Management (SIEM) tools, and vulnerability management platforms. Speaking on the findings, Anuj Goel, Co-founder and Chief Executive Officer of Cyware, stated: "The RSAC survey data reveals a serious gap between that belief and the operational reality. Threat intelligence isn't just about collecting data - it's about connecting people, processes, and platforms to act on it. These findings reinforce the need for more unified, automated, and collaborative approaches to security operations." Internal collaboration and automation maturity were flagged as key areas where organisations fall short. Although almost all those surveyed regard threat intelligence sharing as fundamental, only a small proportion felt their automation systems worked well in practice. Artificial intelligence (AI) is seen as a promising area for improving threat intelligence processes, with 78% of respondents believing AI will enhance threat intel sharing within their organisations. However, only 43% reported that AI has already made a meaningful impact, pointing to difficulties in implementing AI solutions and integrating them into existing security processes. The Cyware survey also drew attention to the timeliness of threat intelligence sharing. Only 17% of teams said they disseminate threat intelligence among key roles — such as SecOps, incident response, and vulnerability management - in real time, while another 25% do so on a daily basis. At the same time, 22% indicated that information is shared infrequently or not at all, raising questions about internal communication and responsiveness to emerging threats. External collaboration with industry peers for the purpose of improving threat intelligence is another area identified for additional growth. According to the survey, while 57% of respondents claimed that their organisation collaborates with other companies in their sector, a significant 30% were unsure if this kind of peer cooperation even exists at their workplace. Automation challenges remain evident, with more than half (56%) of survey participants reporting significant or moderate obstacles in automating workflows across CTI and SecOps teams. This suggests that technical, procedural, or organisational hurdles are hampering efforts to scale effective threat intelligence practices. Additionally, participation in Information Sharing and Analysis Centres (ISACs) or similar organisations is relatively low. Only 18% confirmed their organisation is involved with such groups, while 45% were unaware of any such participation. The lack of engagement or awareness about ISACs could be limiting access to valuable, sector-specific threat information, potentially reinforcing the existing silos within the threat intelligence community. The survey's findings align with a broader trend: as cyber threats evolve and become more complex, organisations face mounting pressure to bridge the gap between recognising the importance of threat intelligence and actually executing it through internal collaboration, real-time sharing, automation, and peer engagement.

Security Operations Ease for First Time in Five Years, Driven by Three Megatrends
Security Operations Ease for First Time in Five Years, Driven by Three Megatrends

Yahoo

time21-05-2025

  • Business
  • Yahoo

Security Operations Ease for First Time in Five Years, Driven by Three Megatrends

NEWTON, Mass., May 21, 2025--(BUSINESS WIRE)--New research from Enterprise Strategy Group, now part of Omdia, shows a turning point in the security operations (SecOps) landscape: for the first time in five years, more organizations report that managing SecOps is becoming easier rather than more difficult. Detailed in 'The Future of SecOps in an AI-Driven World' report, this improvement has been driven by three industry mega-trends: security tool consolidation, the integration of generative AI (GenAI) within SecOps, and the growing maturity of security information and event management (SIEM) and extended detection and response (XDR) solutions. SecOps is a mainstay of modern cybersecurity programs. Once limited to reactive, alert-driven activities, SecOps has expanded into a broader risk mitigation function. Today, it encompasses both proactive and reactive strategies including security posture management, optimization and tuning of core security controls, threat detection and response, and recovery from cyberattacks. Consolidation and platformization are driving tangible benefits across multiple areas—55% of respondents reported positive results from the consolidation of SecOps tools. With budgets constrained in an unpredictable economy, cost optimization and tools management overhead were among the top advantages cited in the report. While a more centralized security data strategy is a priority alongside consolidation efforts, progress remains gradual. "As organizations report significant positive impacts from SecOps tools consolidation, it's important to recognize that tools consolidation must be a continuous process," said Dave Gruber, Principal Analyst at Enterprise Strategy Group, now part of Omdia. "The need for the addition of discrete, specialized security tools will continue as IT innovations expand the attack surface. Organizations should annually reassess opportunities to consolidate specialized tools into platform offerings. This 'continuous consolidation process' should drive cost savings, simplify operations and management, and fuel improvements in security outcomes." GenAI within SecOps is poised for significant contribution across a broad array of security use cases—74% of the study's respondents said they use GenAI-enabled solutions daily to automate security tasks. This rapid adoption puts GenAI within reach of surpassing security orchestration, automation, and response (SOAR) solutions for SecOps automation. GenAI is further helping to reduce long-standing challenges within SecOps, including detection rule engineering, correlation of siloed data sources, and operationalizing threat intelligence. The research further reveals that while XDR and SIEM deliver measurable value, change is on the horizon for SIEM. Although 86% of organizations currently use SIEM, many are seeking to improve their security data layer with 48% either considering or actively planning to replace one or more of their SIEM solutions. Despite SIEM's widespread use for threat detection and response, security teams are looking for more advanced threat detection capabilities. As a result, 64% have deployed an XDR solution. Crucially, the research also indicates a shift in expectations for XDR solutions: organizations now expect them to correlate threat and vulnerability risk information to better prioritize remediation. "Actively improving security hygiene and posture management to reduce the attack surface" tops the list of what organizations said would be most beneficial to improving security efficacy and operational efficiency moving forward. An infographic from the research, The Future of SecOps in an AI-driven World, is available to download here. ABOUT ENTERPRISE STRATEGY GROUP Enterprise Strategy Group™, now part of Omdia, provides focused and actionable market intelligence, buyer research, analyst advisory services, GTM strategy guidance, solution validation, and custom content supporting enterprise technology buying and selling. View source version on Contacts Fasiha Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store