Your New Cybersecurity Tools Are Already Aging – We Can Help

By on

We will bankrupt ourselves in the vain search for absolute security.
– Dwight D. Eisenhower

In the booming industry of cybersecurity, we see increasing numbers of threats all the time. Here are two statistics that put things in perspective: Since 2015 the new malware reported quarterly has more than doubled. In Q1 2017, our research discovered there were 244 new threats every minute, or more than 4 every second.

With threats geysering to that extent, it would be easy to assume that companies should buy the latest, greatest cybersecurity tools, anchor them firmly in place, and feel relieved that they have invested in a strong defense that will last.

And that assumption is wrong. You can’t just write a check and sit back.

No matter how good cybersecurity tools are – and we have some of the best at McAfee – they lose effectiveness over time as a world of attackers picks them apart. In fact, while early adoption of the latest tools provides good  protection for a while, mass adoption of those tools gives attackers more incentives to beat the best tools.

We call this decline in effectiveness Grobman’s curve, named after McAfee’s Chief Technical Officer Steve Grobman, for the principle he laid out in the book The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War.

The big question is: How do you extend that curve to get the longest effectiveness out of your cybersecurity tools? It’s not an abstract question. That effectiveness translates directly to the value of your investment, and your security as a company.

The big answer to that big question is: Agility.

Your company simply must adapt, evolve and stay nimble. It is the only way to stay ahead of bad guys who are constantly chewing at the foundation of your company like an army of termites under your house.

We’re not going to be vague or philosophical about how you do this. Staying agile means you don’t rush out to buy the latest best-of-breed tool only to idly watch it lose effectiveness. You need to invest in an integrated, open-platform approach that allows you to deploy security solutions faster, extend their effectiveness longer, and coordinate all aspects of your security from endpoint to cloud.

You don’t have to do it alone. We really mean it when we say Together is Power. We have invested in this integrated, evolving approach for the future. That’s the spirit behind our McAfee professional services giving you guidance, the free OpenDXL community we’ve built, and our commitment to help your security operations center evolve. Our latest addition is the new Investigator tool that makes insightful analysts out of novices, and arms your organization with analytics that inform your evolving defense. We want to help you learn and grow so you get the most out of all your tools. Here’s a great place to start, with our whitepaper laying out the concepts of Grobman’s curve and how you can apply them to your cybersecurity.

Categories: Business
Tags: ,

Leave a Comment

Similar articles

Analytics 101

By on
From today’s smart home applications to autonomous vehicles of the future, the efficiency of automated decision-making is becoming widely embraced. Sci-fi concepts such as “machine learning” and “artificial intelligence” have been realized; however, it is important to understand that these terms are not interchangeable but evolve in complexity and knowledge to drive better decisions. Distinguishing ...
Read Blog
Simply by downloading the right combination of apps, parents can now track their child's location 24/7, monitor their same social conversations, and inject their thoughts into their lives in a split second. To a parent, that's called safety. To kids, it’s considered maddening. Kids are making it clear that parents armed with apps are overstepping ...
Read Blog
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows a distant attacker to take over an infected Android device, giving the attacker the ability to conduct overlay attacks, gain SMS control, and harvest the victim's contact list. What's more, the author of the Cerberus ...
Read Blog