Are Your Deduplication Capabilities Good Enough?

For security teams, information overload is a real problem: 75% of CISOs reported to Dark Reading that they’re “overwhelmed” by the number of findings they’re receiving, with companies averaging 500+ endpoint security alerts that need investigation per week.

Even worse, not all of those findings are created equal; one report found between 20-40% of all findings are false positives, and these false alarms have slowed down the threat response at 33% of organizations, according to VikingCloud.

The current situation is so stressful that one report found half of cybersecurity professionals expect to burn themselves out within a year, and 80% expect burnout in three years or less. 

This epidemic is being caused in large part by tool sprawl. As an enterprise’s tech stack grows, security teams inevitably have to add more tools to properly scan and test all of the software in use, with the majority of them using anywhere from 21-80 tools, per IDC.

By nature, some of these tools overlap with each other, surfacing the same findings and contributing to the deluge of information. 

In addition, all security scanners unfortunately produce false positives—things that look like issues or vulnerabilities, but which are actually harmless. If they’re caught, a security team must manually address the issue, trading response time speed for accuracy. (81% of professionals are slowed down by manual investigations.) 

If they’re not, however, then developers receive final results including false positives, which will slow down their operations, require rescanning or other rework, and ultimately damage the security-development working relationship when agility and collaboration are essentials for businesses. 

Reducing the number of tools your team uses may seem like an easy solution. In fact, Gartner has found that three-quarters of organizations are working towards vendor consolidation, with efficiency the top reason for doing so. Make no mistake: consolidation can be a useful tool in simplifying your security workflow. However, consolidation for the sake of consolidation, or simply getting rid of tools just to say you’ve gotten rid of them, can leave your tech stack open to exploitation.

Instead, deduplication presents the more feasible answer. It’s a simple enough idea: reduce the total number of alerts or findings a security team has to review by removing duplicate findings. However, manual deduplication is difficult for a number of reasons. 

First, humans are prone to make mistakes or miss something when dealing with repetitive data. Second, manually going through every alert is not an effective use of a security team that’s already being stretched to its limits. In addition to the high occurrence of burnout within the industry, the World Economic Forum reports that cybersecurity as an industry faces a talent gap of four million individuals. 

Consequently, professionals have to do more with less, or they have to push themselves beyond their limits. 98% of security leaders surveyed by BlackFog report working beyond their contracted time average, at an average of nine extra hours per week. 

However, technology can help security professionals with duplicate findings rather than acting as another new tool to integrate into the sprawl. It’s also the same kind of technology that bad actors are using to find new vulnerabilities and issue attacks.

Of course, we’re talking about artificial intelligence (AI). AI, specifically machine learning (ML), doesn’t mind dealing with and consolidating repetitive data, and it can evaluate findings far faster than a human can. It can even learn from humans to better classify alerts in the future and escalate real threats, not false positives. With advanced reasoning and logic, ML can also go beyond simple string matching to more effectively weed out duplicates. However, these same strengths also make ML a great tool for malicious purposes, since ML can also scan for vulnerabilities in software and surface them quickly to bad actors for more avenues of attack. 

This issue is growing quickly, and it’s not going away. 74% of surveyed organizations reported their organizations are already feeling the impact of AI-driven cyber attacks. 89% of the same surveyed individuals believe that this problem will only continue to grow. Given that cybersecurity professionals are already under strain, decision makers have to prioritize assisting their teams in adequately combating this tsunami of threats. 

Effective mitigation requires efficient evaluation of alerts. To do that, teams need to tackle the twin issues of false positives and duplicate alerts.

Since scaling headcount is difficult thanks to the global talent shortage, that means embracing new solutions that cut through the noise by intelligently automating repetitive, time-consuming work. It means embracing ML – not as a panacea for all security issues, but as a tool to be used to reduce your team’s alert fatigue and help them more effectively respond to higher-level threats and execute strategic initiatives. 

Greg Anderson is CEO and creator at DefectDojo

Image:  Ideogram

You Might Also Read: 

How To Combat Cyber Security Burnout:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« NIST'S Post-Quantum Standards Are Just The Beginning
Microsoft Faces £1bn Lawsuit For Cloud Licencing Damages »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Vizius Group

Vizius Group

The Vizius Group are a think tank of cybersecurity consultants who understand the mechanics and business value of risk reduction.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.