Automated DDoS Protection Can Reduce CISO Stress
As cybersecurity woes relentlessly continue and evolve in myriad ways, the weight on the shoulders of cybersecurity staff—from Chief Information Security Officers (CISOs) on down to IT analysts—grows heavier. A recent Security Magazine UK article reports on a survey by Nominet Cybersecurity that quantified the work stress today’s CISOs endure. CISOs have a Sisyphean task of protecting every IT system and point of data, yet they commonly lack adequate budget, they often suffer a shortage of qualified cybersecurity staff, and security breaches are rampant. On top of these challenges, executives and boards have little tolerance for security problems; CISOs also face intense scrutiny and pressure from the top to perform as perfectly as possible.
AI and Automation Can Reduce CISO Stress
What are the options to improve this situation? It’s difficult to change the culture of an organization or the security threat landscape, so CISOs are grappling for ways to do their jobs more efficiently and effectively. Security Magazine wrote, “While there are ways CISOs can somewhat reduce their stress levels, get their budgets enhanced, or increase visibility over their infrastructure, a quarter of CISOs in the UK are convinced that the introduction of automation and AI in cyber-security will make their security roles less stressful, compared to 50 percent of them who feel the adoption of automation and AI will make their jobs “somewhat” less stressful.”
AI and systems that learn for themselves certainly have the potential to drive security innovation. And without doubt automation is essential because cybercriminals increasingly use automated platforms for hacking. This is true especially regarding distributed denial of service (DDoS) attacks.
Most DDoS attacks are non-saturating, designed to evade traditional DDoS mitigation systems, and they also often go unnoticed by the human eye. Even if security analysts notice the attack, manual intervention for DDoS attacks is woefully inadequate; by the time the bad traffic gets redirected, much damage could already be done because it takes only a few seconds for hackers to infiltrate a network. If a security analyst swings out the bad traffic, cloud and scrubbing center solutions can take as long as thirty minutes to go from detection to mitigation. Even the best-equipped organizations struggle to get that time below 10 minutes, and those without big-company resources can take days to complete their recovery efforts. During that lag time, network performance and security can be significantly compromised.
Cloud-Based Solutions and On-Premise Scrubbing Centers Are Not Enough
The bottom line is that cloud-based solutions and on-premise scrubbing centers rely too heavily on overly high thresholds and human intervention, leaving organizations vulnerable to the major damage that can be caused in as little as a few seconds. Therefore, it is incumbent upon cybersecurity professionals to use automated DDoS protection technology.
Why CISOs Should Invest Resources to Prevent DDoS Attacks
CISOs are faced with dilemmas of where to invest their time and resources, but many are understandably stressed out about the possibility of DDoS attacks. This is one area that security professionals should invest in to help secure their networks. And if they do invest in DDoS protection it’s important for organizations to invest in proven security solutions that are highly automated and real-time, rather than relying on human intervention. Automation is not the only answer to cyber woes, but it makes an enormous difference in an organization’s cybersecurity defenses, and that can make CISO burnout much less likely.
For over a decade, Corero has been providing state-of-the-art, highly-effective, real-time automatic DDoS protection solutions for enterprise, hosting and service provider customers around the world. Our SmartWall DDoS mitigation solutions protect on-premise, cloud, virtual and hybrid environments. For more information, please contact us.
Sean Newman is VP Product Management for Corero Network Security. Sean has worked in the security and networking industry for twenty years, with previous roles including network security Global Product Manager for Cisco, who he joined as part of their acquisition of cyber-security vendor Sourcefire, where he was Security Evangelist and Field Product Manager for EMEA. Prior to that he was Senior Product Manager for endpoint and network security vendor Sophos, after having spent more than 12 years as an Engineer, Engineering Manager and then Senior Product Manager for network infrastructure manufacturer 3Com.