The Endless Pursuit of the Ecosystem

The result was the biggest update I've made to Strategy of Security's cybersecurity ecosystem mapping since I first published it over two years ago.
My goal is to define the most comprehensive and accurate taxonomy for the business of cybersecurity as I can.
Let's talk about a few things I realized from obsessing about the cybersecurity ecosystem every waking hour for two straight weeks.
I've been on a kick about cybersecurity estates for most of the past year.
My irrational enthusiasm about this idea has now fully made its way into this cybersecurity ecosystem mapping.
The graphic is now reorganized around the four largest estates - Application Security, Identity Security, Infrastructure Security, and Security Operations.
I felt good about this idea when I wrote my thoughts on cybersecurity estates a few weeks ago.
Cybersecurity's four largest estates are clear.
Most of cybersecurity's public companies and invested capital live there.
Estates are also the epicenter of strategic activity in cybersecurity, and sometimes all of tech.
A savvy observer sees the appeal: new SEC cybersecurity disclosure rules, emerging cybersecurity and privacy regulations in the U.S. and Europe, CISO fraud charges, and more are making this marketsurprisingly popular.
You could also make a case that Consumer Security and Privacy, Fraud and Transaction Security, Data Security, and Services are already estates.
The cybersecurity ecosystem is crowded, but it's still big enough for more estates.
Big tech aggregators like Microsoft, Cisco, and Alphabet all have multi-billion-dollar cybersecurity businesses.
They're so big that even the biggest pure cybersecurity companies are doing $1 billion in revenue through them.
Pure cybersecurity companies like CrowdStrike and Palo Alto Networks are combining multiple categories into platforms.
Companies are converging several types of application security testing tools to create end-to-end Application Security Testing platforms.
You never have the cybersecurity ecosystem totally figured out.
Now, in the last few words of a long and humbling process, I'm viscerally aware that none of us have the cybersecurity ecosystem totally figured out.
Fully understanding cybersecurity is an ideal, not a realistic achievement.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 08 Dec 2023 20:43:05 +0000


Cyber News related to The Endless Pursuit of the Ecosystem

Creating a Smart Home Ecosystem: Seamless Connectivity - Like a finely tuned symphony, creating a smart home ecosystem has the potential to bring harmony and convenience to everyday life. Establishing an interconnected network of digital devices to enable user-controlled automation of various household ...
11 months ago Securityzap.com
The Endless Pursuit of the Ecosystem - The result was the biggest update I've made to Strategy of Security's cybersecurity ecosystem mapping since I first published it over two years ago. My goal is to define the most comprehensive and accurate taxonomy for the business of cybersecurity ...
11 months ago Securityboulevard.com
Addressing the Cybersecurity Vendor Ecosystem Disconnect - COMMENTARY. If you are a member of the security team in charge of defending a network, you are probably accustomed to working with a technology stack composed of hardware, software, and data from dozens of different sources. Consolidating and joining ...
6 months ago Darkreading.com
The New Cybercrime Atlas: A Collaborative Approach to Fighting Digital Crime - The global transition to the digital economy means that the operations of governments, critical infrastructures, businesses, and individuals are now a tightly integrated system of interconnected resources. Cybercrime presents a significant risk to ...
9 months ago Feeds.fortinet.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
8 months ago Feeds.dzone.com
The Rise in Attacks Requires Specialized Expertise - Organizations today are increasingly reliant on the convenience, scalability and cost-effectiveness of migrating data and operations to the cloud. While cloud migration offers organizations significant benefits, it has also opened them up to a myriad ...
11 months ago Paloaltonetworks.com
Navigating the MSP Ecosystem in 2024: The Trifecta of Success - As the curtains draw close on another tech-filled year, let's take a delightful detour into the whimsical world of MSPs, where predictions meet pizzazz, and success is measured in Leadership, Empathy, and a dash of Execution magic. In the midst of ...
10 months ago Securityboulevard.com
Why We Need to Cultivate a Confidential Computing Ecosystem - Researchers have been working on solutions for runtime security for years now. Computing data and deriving value from it - while also preserving its privacy - is no small challenge. The industry is tackling runtime security on all fronts - we've seen ...
9 months ago Securityboulevard.com
Inside the strategy of Salesforce's new Chief Trust Officer - In this Help Net Security interview, Arkin discusses a collaborative approach to building trust among customers, employees, and stakeholders, focusing on transparency, shared responsibility, and empowering others to integrate trusted and responsible ...
9 months ago Helpnetsecurity.com
CVE-2024-49629 - Cross-Site Request Forgery (CSRF) vulnerability in Fahad Mahmood Endless Posts Navigation allows Stored XSS.This issue affects Endless Posts Navigation: from n/a through 2.2.7. ...
4 weeks ago
Europe Sees More Hacktivism, GDPR Echoes, and New Security Laws Ahead for 2024 - An evolving geopolitical landscape has impacted cybersecurity in Europe this year, posing specific challenges for safeguarding critical infrastructure and sensitive data. The Ukraine war and the conflict in Gaza have led to a rise in hacktivism, and ...
10 months ago Darkreading.com
Cisco Foundation Grantees prioritize Indigenous leadership to protect the Amazon Basin - This is the first of our three-part series on Cisco Foundation grantees working in the Amazon and South America region. This series will introduce you to eight Cisco Foundation Climate Impact & Regeneration grantees working to support preservation ...
9 months ago Feedpress.me
Building a Collaborative Approach to Secure the Connected World - In today's rapidly evolving digital landscape, public key infrastructure has emerged as an essential component of digital trust, underpinning security across myriad interconnected domains, from users and devices to the Internet of Things and ...
11 months ago Securityboulevard.com
VicOne partners with BlackBerry to help detect cyberthreats to connected cars - VicOne announced a partnership with BlackBerry to strengthen the cybersecurity posture of the automotive ecosystem. By leveraging ML processing at the edge and cloud-controlled access to vehicle data, the partnership will enable car manufacturers and ...
10 months ago Helpnetsecurity.com
Record Breaking $153,000+ Already Invested into the Security of the WordPress Ecosystem by Wordfence - In just a few short months since our launch in November of last year, the Wordfence Bug Bounty Program has already awarded over $153,000 in bounties to WordPress security researchers who have been responsibly reporting security issues in WordPress ...
8 months ago Wordfence.com
WordPress Security Research: A Beginner's Series - Over the coming months, this series will be presented through multiple blog posts, each delving into the fundamentals of WordPress's architecture and security mechanisms while featuring real-world examples of vulnerabilities and their exploitation. ...
4 months ago Wordfence.com
Coming Soon to a Network Near You: More Shadow IoT - News of former Microsoft head of product Panos Panay's exit caused a small stir in the tech industry when it was learned he would join Amazon to lead that company's product division. Precisely what Amazon and Panay have in mind for that ecosystem has ...
10 months ago Securityweek.com
VicOne Partners With 42Crunch to Deliver Comprehensive Security Across SDV and Connected-Vehicle Ecosystem - PRESS RELEASE. DALLAS and TOKYO, May 29, 2024- VicOne, an automotive cybersecurity solutions leader, today announced a partnership with 42Crunch to enhance the security of application programming interfaces for the software-defined vehicle and ...
5 months ago Darkreading.com
Solaris SE partners with Salt Security - Salt Security, the leading API security company, today announced that Solaris SE, Europe's leading embedded finance platform, has deployed Salt Security's API Security Platform to secure the company's expanding API ecosystem. Solaris' technology ...
5 months ago Itsecurityguru.org
Cisco Customer Advocate Awards: Americas 2024 Finalists - The Cisco Customer Advocate Awards honor exceptional Cisco customers who exemplify innovation through their use of Cisco products and solutions, and who share their successes through thought leadership, including success stories, speaking ...
6 months ago Feedpress.me
Exploring How Virtual Worlds Change Social Media Experiences - Humans have always desired to connect with one another, from the days of sending letters to the current age of social media. As technology has advanced, so have the ways we communicate. We are now seeing a shift in the way tech giants are embracing ...
1 year ago Hackread.com
Why Automation and Consolidation are Key to Restoring Confidence in Cybersecurity - Our research shows that security leaders would need to find a 40% budget increase to restore confidence in their security posture. It's unsurprising that a lack of security skills and budget - both for training as well as general cybersecurity - are ...
11 months ago Securityboulevard.com
Is Your Cloud Security a Mess? Five Problems CNAPP Can Cure - The rush to adopt cloud technologies can sometimes feel like sprinting towards a cliff's edge. Data breaches, compliance violations, overwhelmed teams - these troubling trends have become far too commonplace these days - especially when you consider ...
4 months ago Securityboulevard.com
Cyber Insights 2023: Criminal Gangs - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. Despite some geopolitical overlaps with state attackers, the majority of ...
1 year ago Securityweek.com
CVE-2021-29215 - A potential security vulnerability in HPE Ezmeral Data Fabric that may allow a remote access restriction bypass in the TEZ MapR ecosystem component was discovered in version(s): Prior to Tez-0.8: mapr-tez-0.8.201907081100-1.noarch; prior to Tez-0.9: ...
2 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)