Why The Detection-First Security Approach Isn't Working

vtqhtr413

Level 27
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Aug 17, 2017
1,280
17,222
2,568
Stopping new and evasive threats is one of the greatest challenges in cybersecurity. This is among the biggest reasons why attacks increased dramatically in the past year yet again, despite the estimated $172 billion spent on global cybersecurity in 2022. Armed with cloud-based tools and backed by sophisticated affiliate networks, threat actors can develop new and evasive malware more quickly than organizations can update their protections. Relying on malware signatures and blocklists against these rapidly changing attacks has become futile. As a result, the SOC toolkit now largely revolves around threat detection and investigation. If an attacker can bypass your initial blocks, you expect your tools to pick them up at some point in the attack chain. Every organization's digital architecture is now seeded with security controls that log anything potentially malicious. Security analysts pore through these logs and determine what to investigate further. Does this work? Let's look at the numbers:
 
... threat actors can develop new and evasive malware more quickly than organizations can update their protections...

Developers are always going to be using the 'whack-a-mole' approach to security. To do otherwise would not be cost effective, either financially or in system overhead terms.

$172 billion sounds a lot, but my government just spent $500 billion for 3 submarines, so some perspective is required here.