Cookie Consent by Free Privacy Policy Generator 📌 Why Now is the Time to Converge IT and Security Functions

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 Why Now is the Time to Converge IT and Security Functions


💡 Newskategorie: IT Security Nachrichten
🔗 Quelle: cio.com

IT and security are at it again. Both teams are facing difficulties adapting to the recent move to hybrid technology environments. IT is struggling to bring new endpoints under management, while security is struggling to lock down as many of these new systems as possible. Neither team can agree on which is more important, maintaining performance even if it means leaving some security gaps open or locking everything down even if it means limiting operations. 

This moment of change and conflict has reignited many long-standing questions about how these two functions should work together. Should IT and security remain separate functions, or should they become one? Should IT be absorbed into security, or should it be the other way around? Should either of them exist as their own standalone functions, or should they both become an embedded part of the business functions they serve?

What it means to converge IT and security teams

Convergence is not the same as fully merging the teams with one other. There are a few reasons why they must maintain some independence from each other and remain separate functions: 

  • While IT and security share some activities and outcomes, they will always have their own distinct goals that still need to get done.
  • Organizations will always need teams and leaders who offer specialized perspectives and skills and solely focus on how a narrow domain operates.
  • Neither function is “correct” all of the time; there are times IT should be the priority and times security should be, and both functions need advocates.

For these reasons and more, merging IT and security is not an option. At the same time, maintaining the status quo is no longer an option. Thankfully, converging IT and security offers a best-of-both-worlds solution. 

When you converge IT and security, you allow them to remain as separate functions, but you bring them closer together. To do so, you break down certain siloes between the two functions, sync their priorities, and create conditions where they can coordinate and collaborate on shared activities. Overall, when you converge IT and security, you help them act like one team in the moments they intersect, primarily around managing and securing endpoints. 

While there are multiple ways these functions can work closer together to keep endpoints secure and operational, there is one initial area where IT and security must converge ASAP. That is shared visibility. 

First, converge IT and security around a single source of truth

IT and security are suffering from a visibility gap largely created by the two functions operating entirely separate from each other. 

Most IT and security teams have their own set of point tools. Each of these only offers a small piece of the solution required to manage and protect endpoints, and many are redundant between the two functions. These siloed tools often collect their own data and make it difficult—if not impossible—for either CIOs or CISOs to stitch together a comprehensive picture of the environment in real time. 

Despite heavy investment in new tools by both IT and security, this visibility gap isn’t closing; it’s growing. A recent study found that in 94% of enterprises, up to 20% of all endpoints remain undiscovered and unprotected. This visibility gap created by IT and security operating separately causes big problems for both functions.

  • IT must manage their endpoints without being able to answer basic questions like “How many endpoints do I have” and “What applications are we running?”
  • Security must protect their endpoints without knowing the answers to fundamentals on whether endpoints or patched or if there are proper controls on every endpoint 
  • IT and security must agree on priorities without sharing the same picture of what vulnerabilities exist in the environment and what it takes to close them. 

To solve these problems and to bring IT and security closer together as a whole the two functions must create and converge around a single, comprehensive, and real-time picture of their environment. Now is the right time to create this single source of truth and lay the foundation for broader convergence between IT and security. Here’s why. 

Why organizations need IT-security convergence more than ever

The pandemic is only part of the problem. For the most part, IT and security must now converge due to multiple long-term trends that have reached a tipping point. 

  • Ransomware and other attacks are succeeding. Organizations spent over US$160 billion on cybersecurity this year, yet ransomware attacks are still occurring every 11 seconds. Despite endpoint management and security getting more attention than ever, these problems are only getting worse. 
  • The attack surface is larger than ever. The pandemic and the creation of large-scale hybrid networks are only part of the problem. The global network of Internet-of-Things (IoT) devices is expected to grow to 43 billion devices by 2023, and all digital devices are becoming more integrated than ever. 
  • Most security challenges are operational in nature. The most ways to close the attack surface and defend against ransomware involve coordination between IT and security, including asset management, configuration management, patch management, and application security management. 
  • Endpoint technology has advanced. Organizations no longer need to deploy dozens of point tools to manage and secure their endpoints. They can now replace these tools with a converged endpoint management (XEM) platform that consolidates all necessary visibility and workflows.   

These trends and challenges will only grow. Organizations must solve them while they are still manageable. And convergence between IT and security is the solution.  

Learn how to converge IT and security with Tanium here

Security Practices
...



📌 Why Now is the Time to Converge IT and Security Functions


📈 56.3 Punkte

📌 Why Now is the Time to Converge IT and Security Functions


📈 56.3 Punkte

📌 Better Together: Why It's Time for Ops and Security to Converge


📈 40.4 Punkte

📌 Serverless Prey - Serverless Functions For Establishing Reverse Shells To Lambda, Azure Functions, And Google Cloud Functions


📈 36.42 Punkte

📌 Functions of Commercial Bank: Primary Functions and Secondary Functions


📈 36.42 Punkte

📌 Why it makes sense to converge the NOC and SOC


📈 32.31 Punkte

📌 Networking and security teams tasked to converge, collaborate


📈 28.6 Punkte

📌 Deportation, Detention, and Other Crimes: In Ukraine, the Past and Present of International Criminal Law Converge


📈 28.46 Punkte

📌 Security Gaps Remain as OT, IT Converge


📈 26.82 Punkte

📌 One Apple platform in 2021: The year iPad and Mac begin to converge


📈 26.68 Punkte

📌 Blockchain, AR and VR Converge


📈 26.68 Punkte

📌 Infrastructure Risks Increase As IT and OT Converge


📈 26.68 Punkte

📌 Why You Should Consider A Security Certification (and why now is the time)


📈 25.49 Punkte

📌 Converge Technology Solutions Corp. schließt Übernahme der Stone Group ab


📈 24.9 Punkte

📌 Programming Language Gurus Converge on 'Curry On' Conference


📈 24.9 Punkte

📌 Programming Language Gurus Converge on 'Curry On' Conference


📈 24.9 Punkte

📌 You can win $1 million investment from OpenAI through Converge program’s second cohort


📈 24.9 Punkte

📌 When Stealers Converge: New Variant of Atomic Stealer in the Wild


📈 24.9 Punkte

📌 Converge collaborates with CyberCube to improve cyber resilience for businesses


📈 24.9 Punkte

📌 Multiple Threats Converge to Heighten Disinformation Risks to This Year’s US Elections


📈 24.9 Punkte

📌 Durable Functions 2.0 - Serverless Actors, Orchestrations, and Stateful Functions


📈 24.88 Punkte

📌 The difference between Arrow functions and Normal functions in JavaScript


📈 24.88 Punkte

📌 Hooking Linux Kernel Functions, Part 2: How to Hook Functions with Ftrace


📈 23.09 Punkte

📌 Hooking Linux Kernel Functions, Part 2: How to Hook Functions with Ftrace


📈 23.09 Punkte

📌 Polypyus - Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries


📈 23.09 Punkte

📌 Durable functions in Python for Azure Functions | Azure Friday


📈 23.09 Punkte

📌 You Need to Know About Pure Functions & Impure Functions in JavaScript


📈 23.09 Punkte

📌 C User-Defined Functions vs Library Functions


📈 23.09 Punkte

📌 JavaScript Arrow Functions vs Regular Functions


📈 23.09 Punkte

📌 Arrow Functions vs. Regular Functions in JavaScript: A Comprehensive Guide


📈 23.09 Punkte

📌 darktable now has a full time dev, now lets pay him a full time wage!


📈 21.05 Punkte

📌 Why Sea of Thieves' Season 10 is both an incredible time to return and a reason to try it for the first time


📈 19.75 Punkte

📌 Enable Real Time Notifications in Power Apps with Signal R, Azure Functions and PCF


📈 19.5 Punkte











matomo