How to incorporate human-centric security

Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more.
Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible.
A recent study from Cisco found that only 15% of companies are ready to defend against threats with a mature approach, citing the changes to hybrid work as a major reason that many companies are not prepared.
These solutions were designed to fight a specific kind of threat and are implemented on an island - not talking to the other security solutions.
3) Even new multi-pronged cybersecurity approaches are all focused on threats, which are already happening.
The relatively new approach called XDR was designed to pull together information from disparate threat detection software like cloud, network and email, to respond to more complex threats by sorting through raw data and alerts and mitigating threats across vectors.
While this coordinated approach to threat mitigation is necessary, the focus is on threats, not risks.
At the same time, recent data from Gallup shows that people are stressed in record numbers - 44% of respondents said that they experienced a lot of stress the previous day - which paves the way for insider threats.
The concept of human-centric security focuses on better management of the insiders that either inadvertently or maliciously cause so many of the threats that companies must deal with.
A human-centric approach to security not only takes the burden of security off the employee, it starts to look at the overall risk associated with certain behaviors and on improving the experience of employees.
Another important way to look at risk is to analyze the behaviors that are most likely to lead to future threats and determine new ways to mitigate those risks to reduce future threats.
Any number of solutions can be put in place based on various risk signals before they become threats.
Human-centric security complements threat detection.
Far from replacing the various threat detection and mitigation solutions in place, human-centric approaches serve as a valuable companion.
Not only can they serve as an early detection layer that can improve insider risk and reduce threats, they can also feed valuable information to threat detection solutions.
Without monitoring, there's the risk that the threat goes undetected until it's too late.
Can give an early warning sign of an insider threat.
Pattern mining activities by employees allows to immediately detect subtle changes in behaviors leading to identifying threats before they happen.
Perhaps the wisest aspect to human-centric security is the focus on employees and the need to create a better experience that reduces friction well before a threat occurs.
While technology is incredibly valuable in the cybersecurity landscape, understanding the habits of the people that work for an organization and making it less likely that they cause a threat provides benefits well beyond cybersecurity.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 27 Dec 2023 05:43:04 +0000


Cyber News related to How to incorporate human-centric security

How to incorporate human-centric security - Cybersecurity is awash in threat detection and mitigation solutions: SIEM, DLP, SOAR, MDR, EDR, XDR, and more. Threat detection is essential, as it serves to locate and minimize the threat as quickly and effectively as possible. A recent study from ...
11 months ago Helpnetsecurity.com
CVE-2012-5010 - ASA 5515-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.4.x before 9.4.1 Interim, 9.2.x before 9.2.4 Interim, ASA 5510 Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 8.4.x before 8.4.7 Interim, ...
1 year ago
Human-Centric Security Model Meets People Where They Are - According to Gartner's Drivers of Secure Behavior survey, 93% of employees who behave insecurely do so knowingly. The Many Paths to Human-Centric Security Human-centric security considers people's behaviors, needs, and limitations at all points - not ...
1 year ago Darkreading.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
1 year ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)