The fundamental divide between traditional SOC operations and cloud security operations represents a critical gap in the cybersecurity industry that emerged from the rapid migration from data centers to cloud environments. Traditional SOCs operate on centralized, perimeter-based security models designed for static, predictable infrastructure, while cloud security demands entirely different approaches to handle distributed, dynamic environments with ephemeral workloads and shared responsibility models. This shift has created a severe skills crisis, with 38.9% of organizations identifying cloud security as their most significant skills shortage and nearly 4.8 million cybersecurity jobs remaining unfilled globally. The complexity of multi-cloud environments, lack of centralized visibility, and the need for continuous configuration monitoring have exposed organizations to new attack surfaces that traditional security tools cannot adequately address. Unlike data centers where organizations maintain complete physical and logical control, cloud environments require specialized expertise in identity-centric security, API protection, and automated compliance monitoring under complex shared responsibility models. Organizations must bridge this gap through comprehensive cloud security Programs, cloud security tools, Zero Trust architectures, and recognition that cloud security is not simply an extension of traditional practices but requires fundamental transformation in skills, processes, and organizational culture to effectively protect digital assets in our increasingly cloud-centric world.
Unresolved Challenges in Cybersecurity Practices
Explore top LinkedIn content from expert professionals.
Summary
Unresolved challenges in cybersecurity practices refer to persistent gaps and limitations in how organizations protect digital data, systems, and networks from evolving threats. These challenges often arise from complex technology environments, shifting attack strategies, and the inherent weaknesses in software and hardware that cannot be fully secured.
- Embrace continuous learning: Stay updated with new security concepts and technologies since attackers constantly adapt and exploit weaknesses that traditional defenses may miss.
- Balance preventive and reactive strategies: Combine proactive measures like strict access controls with dynamic monitoring and response protocols to address potential breaches and data theft.
- Adapt security architecture: Revisit assumptions about access and validation, ensuring that permissions and trust are regularly reassessed in changing environments.
-
-
While former NSA Chief Paul Nakasone’s remarks highlight important shifts in cybersecurity policy and leadership, it’s crucial to recognize a deeper, systemic issue that remains largely unaddressed. Despite all the advanced tools and countermeasures deployed today, the best cybersecurity defenses in the world are only stopping about 6% of cyber attacks globally. This stark reality underscores a fundamental truth uncovered by the Department of Energy back in the 1980s using some of the most powerful computing resources of the time, including Cray supercomputers they discovered inherent vulnerabilities in electronic software and hardware that cannot be fully secured. No matter how much policies or leadership evolve, the architecture of our technology itself carries unfixable weaknesses that sophisticated adversaries exploit. Until the industry confronts these hard limits, shifts in strategy will at best provide incremental gains rather than a true solution. We need a paradigm shift in how we approach security one that acknowledges these inherent flaws and innovates beyond traditional defensive measures. “I also want to thank former NSA Chief Paul Nakasone for referring Bugged.com CEO Michael Peros to a TSCM bug-sweeping professional client.” #defcon #cybersecurity #bugged.com #rossyoung #tscm #michaelperos #nsa #bugsweep #blackhat #blackhat2025 #defcon2025 #whiteknight #buggedmobile #buggedmobile.com #tscm #bugged #michaelperos #tscm #bugged.com #buggedmobile #cyberbugged #snakeoil #CSFI #AI #NIST
-
The evolution of Cyber Security went from securing the network to securing the cloud over the last few years. Despite this progress and the success of Cloud Security Posture Management (CSPM) tools, organizations are still not where they need to be in terms of their security posture. It is quite well known that data breaches are still increasing and exfiltration continues to happen at an alarming rate. Most organizations as well as cybersecurity companies have realized that securing data remains a complex and largely unsolved problem. The complexity inherent in data security comes from its wide reach across identities and devices and its storage across multiple platforms, such as databases and data warehouses. A common misconception in organizations is that if they are compliant, they are also secure. However, compliance does not necessarily equate to security. There are various issues with the current security tools in the market. While Data Security Posture Management (DSPM) tools are widely used, they were built to address privacy matters and hence are more inclined towards compliance rather than security. Even though some DSPM tools have expanded their capabilities to include discovering sensitive data and detecting vulnerabilities in database configurations based on CIS benchmarks, this is still not enough for effective data security. Scanning vulnerabilities in database configuration represents a static posture, which means this cannot detect exfiltration attempts in real time. This limitation highlights the necessity for more dynamic and responsive security measures. Effective data security needs to be encompass: ✨ Preventive security measures - This strategy focuses on proactively identifying vulnerabilities and implementing safeguards to prevent security incidents. This should involve a comprehensive approach where the organization implements various measures to strengthen its security posture, aiming to prevent any potential breaches from occurring. ➡ Example: Managing and Governing data access, Removing dormant users, Protecting credentials, Resolving database misconfigurations, etc. ✨ Reactive security measures - This strategy focuses on swiftly detecting and responding to security breaches if they happen. This must include a range of protocols designed to minimize the time to detect any breach and mitigate the impact of breaches as soon as they are detected. ➡ Example: Database activity monitoring, Data detection and response, Anomaly detection on access logs in real-time, etc. An organization can have an effective security posture only through the combination of preventive and reactive security strategies. Most cybersecurity tools in the market are point solutions that focus on one or the other, leading to gaps in an organization's security posture. This is why there is an increasing trend for integrated cybersecurity products especially around data.
-
One of the most pressing challenges in SOCs today is the overwhelming volume of alerts, leading to alert fatigue and analysts missing critical threats. High false positive rates and outdated detection rules further exacerbate this issue, reducing efficiency. To address these challenges, a strategic focus on detection engineering and automation is crucial. To enhance your threat detection capabilities, start by mapping your existing use cases to the MITRE ATT&CK framework if it's not already in place. This provides a structured approach to identifying gaps in coverage. After this, review the false positive ratio of your current detection rules to assess their effectiveness and prioritize optimization. While striving for comprehensive MITRE ATT&CK coverage is a worthy goal, it's important to recognize that achieving 100% coverage is not feasible. Instead, leverage threat intelligence to focus on the TTPs (Tactics, Techniques, and Procedures) most commonly used by adversaries targeting your environment. Start by addressing these high-priority TTPs. However, coverage should not be seen as binary. Simply having a detection rule for a TTP does not mean full coverage—depth of coverage is key. Before expanding coverage to additional TTPs, ensure your current data sources are adequate to cover the targeted techniques. This foundational step ensures that your coverage is based on reliable and relevant data. Once this is in place, you can expand your coverage to include additional TTPs, even those beyond your immediate threat landscape, by incorporating more data sources and threat intelligence. Key Practices for Optimizing Threat Detection: 1- Prioritize an automation-first strategy, handling alerts through automated workflows wherever possible. 2- Continuously refine and optimize detection rules to minimize false positives and improve effectiveness. 3- Foster collaboration between analysts and detection/automation engineers to enhance the detection engineering process. 4- Establish metrics to evaluate the quality of detection rules, focusing on those that provide the most value and can be improved over time. 5- Increase the specificity of detection rules to reduce noise and improve the signal-to-noise ratio. 6- Aggregate noisy alerts for batch analysis rather than addressing them individually in real-time, improving resource efficiency. 7- Make risk-based decisions when prioritizing rule development, removing or refining low-value rules that consume excessive resources. Focusing on detection engineering and automation will allow you to manage alert flow more effectively, ensuring that analysts can dedicate their attention to the alerts that truly matter. This shift will enhance threat detection maturity, improve operational efficiency, and reduce the impact of alert fatigue. #Cybersecurity #MITRE #ThreatDetection #Automation #SOC #DetectionEngineering #ThreatHunting #CyberDefense #SIEM #SecurityOperations #IncidentResponse
-
Dr. Jason Edwards, DM, CISSP, CRISC, A comprehensive and well-structured aggregation of current threat activity. The breadth is useful—but the real signal is not in the individual incidents. It is in the pattern they collectively reveal. Across identity compromise, supply chain poisoning, edge device exposure, and AI account targeting, a consistent shift is visible. Systems are not being broken. They are being operated under assumed validity. Authentication succeeds. Sessions are legitimate. Updates are trusted. Access is approved. And yet, the outcome is compromise. This is not a failure of detection. It is a failure of context persistence. Security architectures still assume that once something is validated, it remains valid for the duration of its execution. That assumption no longer holds in environments where conditions change continuously and adversaries operate within those same trusted pathways. A session approved moments ago may no longer be admissible. A trusted dependency may already be compromised. An identity may still be valid technically, but not operationally. The system continues to function correctly. But the conditions that justified its operation have already shifted. This is where the current threat environment is moving. Not toward louder intrusion, but toward quiet execution inside legitimate systems. The implications extend beyond cybersecurity operations. As identity becomes the primary access layer, as software supply chains become execution pathways, and as AI platforms become repositories of internal reasoning and data, the boundary between “inside” and “outside” loses meaning. At that point, security is no longer defined by whether access was granted. It is defined by whether that access remains continuously justified. This is the emerging challenge: Not visibility. Not detection. Not even response speed. But the ability to ensure that execution remains conditionally valid at every moment it persists. That is the layer where the next set of failures—and the next level of control—will be determined. Linda Restrepo, N360™ — Sovereign Intelligence & National Security Technologies
-
Why National Cybersecurity Programs Fail I hold a reasoned opinion that despite the growing global urgency around digital threats, many national cybersecurity programs falter—not due to lack of ambition or awareness, but because of deep-rooted structural, political, and operational challenges. At the heart of many failures is the absence of sustained political will. Cybersecurity demands long-term commitment at the highest levels of government, but priorities often shift with electoral cycles, leaving national strategies underfunded and poorly implemented. Without clear, empowered leadership to coordinate across sectors and ministries, initiatives fragment into isolated efforts that lack cohesion or scale. Equally problematic is the overemphasis on drafting strategies while underinvesting in execution. A national cybersecurity plan may check all the right boxes on paper, yet fall apart when no resources are allocated to build capacity, modernize infrastructure, or maintain real-time threat monitoring. Ambition without a budget is theatre. Public–private collaboration remains another critical fault line. In most countries, key infrastructure is owned and operated by the private sector, yet governments often design cybersecurity policies in silos, alienating those who bear the brunt of risk. Without trust, transparency, and shared responsibility, meaningful cooperation becomes difficult, and the national posture weakens as a result. Many programs also rely on outdated legal frameworks that cannot keep pace with rapidly evolving threats such as AI exploitation, ransomware, or supply chain attacks. Without regular legislative updates and agile regulatory mechanisms, national systems remain vulnerable—even when technical ambitions are high. Human capital remains a persistent Achilles’ heel. A chronic shortage of cybersecurity professionals, coupled with the inability of the public sector to compete with private compensation packages, means many programs lack the skilled personnel to implement, monitor, or enforce security protocols at scale. Talent, not just tools, is the real infrastructure. Even where good intentions exist, progress often falters due to the absence of accountability. Without clear metrics, key performance indicators, or regular maturity assessments, there is no way to measure success, detect weaknesses, or refine direction. Programs drift, and risks go unmitigated. Finally, too many national efforts remain reactive rather than proactive, launched only in the wake of a major cyber incident. While such crises may generate temporary momentum, they often lead to patchwork solutions rather than systemic resilience. A sustainable national cybersecurity program requires more than just policies and procurement. It demands vision, coordination, political endurance, private sector integration, legal reform, investment in human capital, and above all, the discipline to move from strategy to structured execution.
-
Many cybersecurity problems we believe we cannot solve are not caused by a lack of technology. The issue is not having more tools, more rules, or more people; the issue is the nature of systems themselves. As systems grow, complexity increases, and with complexity comes disorder ⚠️ entropy⚠️ which means security is constantly playing catch-up. Goals like perfect visibility, real-time detection, or flawless protection sound correct in theory, but in practice they collide with physical limits. You cannot see everything, you cannot analyze everything in real time, and you cannot control every flow. This is not an operational failure; it is a reality. Detection delay in cybersecurity is often interpreted as failure, yet delay is unavoidable. Data is generated, collected, processed, correlated, and then decisions are made; this chain takes time, and zero latency is impossible. Likewise, the speed gap between attackers and defenders does not come from tooling but from structure. An attacker only needs to find one path, while defense must protect everything. This asymmetry is not purely technical; it is structural, and it behaves like a physics problem. For this reason, the goal of cybersecurity strategy should not be “perfect security,” because that objective is unrealistic. The real strategy is about managing complexity, increasing decision speed, reducing blast radius, and building resilience despite unavoidable delay. Cybersecurity is not a tool race; it is a system design problem that requires respecting limits. Security is not about completely stopping attackers, but about keeping systems standing despite physical constraints. #Cybersecurity #CyberSecurityStrategy #CyberResilience #SecurityLeadership #CISO #CyberRisk #SecurityArchitecture #ExposureManagement #DigitalResilience #CyberDefense #SecurityStrategy #Infosec #CyberSecurityAwareness #SecurityInnovation #FutureOfSecurity
-
As I have cybersecurity conversations with cyber professionals across various sectors about a number of growing issues, one of the most consistent is the lack of dedicated senior level cybersecurity leadership. Organizations are attempting to state they have a cybersecurity program, when they don't. They have cybersecurity relegated to someone in their IT department. No cybersecurity leader equals no direction for the cybersecurity program, here are some points to understand: Lack of Direction in Cybersecurity Strategy Without a dedicated leader, businesses often operate reactively rather than proactively when it comes to cybersecurity. Cybersecurity leadership ensures that an organization has: A clear plan for threat detection, response, and prevention. Strategic alignment between cybersecurity initiatives and business objectives. Ongoing assessments to identify vulnerabilities and areas for improvement. Without this direction, companies risk spending money on ineffective tools or neglecting essential security measures altogether. The absence of a clear strategy leaves businesses exposed to avoidable risks. Financial and Reputational Consequences Reputational damage from leaked customer data, leading to lost trust and reduced customer loyalty. A cybersecurity leader ensures these risks are managed proactively, minimizing the likelihood and impact of breaches. Regulatory Non-Compliance Governments and industries are implementing stricter cybersecurity requirements. Without dedicated leadership, companies may struggle to keep up with these evolving regulations. This can result in: Costly fines for failing to meet compliance standards. Lost opportunities, as clients and partners demand evidence of robust security practices. Legal challenges and liabilities stemming from breaches. Cybersecurity leaders stay ahead of regulatory trends and ensure the organization remains compliant. Reactive Rather Than Proactive Responses Organizations without cybersecurity leadership often fall into a cycle of reacting to problems after they occur rather than preventing them. This approach is more expensive and less effective. Dedicated leadership ensures: Continuous monitoring of threats and vulnerabilities. Implementation of advanced tools like AI-driven threat detection. Investment in long-term solutions rather than quick fixes. Proactive strategies are not just more cost-effective; they also build resilience. The Role of a Cybersecurity Leader A Chief Information Security Officer (CISO) or equivalent leader plays a crucial role in managing these challenges. They: Develop and oversee a comprehensive cybersecurity strategy. Communicate cybersecurity risks and strategies to the executive team and board. Ensure alignment between IT and business goals. Lead incident response efforts and oversee audits and compliance. Advocate for a culture of cybersecurity awareness throughout the organization. This is not an all inclusive list of course but provides an idea..
-
My Reflections on the New Year Rather than reiterating common narratives about “increasing threats and attacks”, I want to focus on actionable insights for the upcoming year: 1. Emphasizing Cross-Discipline Teams in Cybersecurity Shared Responsibility: Cybersecurity is a collective responsibility. Too often, I encounter scenarios where I'm only engaging with a single group, such as a security team, when I also need to involve the networking team, identity providers (IdP), endpoint team, and cloud applications team. Organizations must foster and mandate cross-functional collaboration to ensure that all relevant teams are working in unison. Effective cybersecurity requires seamless coordination and communication across all departments. 2. Advancing SASE-Based Zero Trust Beyond the Basics Maturity in Implementation: SASE-based Zero Trust should be more than a trendy phrase; it should be a matured, integral part of your cybersecurity strategy. At this stage, organizations should have moved beyond initial adoption and be actively implementing advanced practices. Key concepts include: Brokered Connections: Facilitate secure, intermediated connections. Isolation of Apps and Users from the Network: Prevent direct access to critical resources. Proximity of Security Stack to Users: Ensure that your security measures are close to where your users are, regardless of their location. TLS Inspection at Scale: Comprehensive visibility is crucial; you cannot protect what you cannot see. 3. Purple Teaming: It is imperative that we engage in ongoing testing of our security controls through Purple Teaming exercises. This approach enables us to identify and address any vulnerabilities or gaps in our defenses, our playbooks, and our IR plans.. Regular and thorough tuning of our security measures is essential to ensure that enterprise risk is effectively managed and mitigated. By focusing on these areas, we can enhance our cybersecurity posture and better prepare for the challenges of the new year.
-
It’s pretty obvious that the cybersecurity community has not fully come to grips with the impending reality of an agentic workplace in which AI agents outnumber human workers by 10:1, 50:1 or more. Nor have we collectively come to terms with the ways in which agent behavior differs from the behavior of conventional IT end users – both human and nonhuman. Agents are not surrogate knowledge workers, service accounts or cloud workloads. Many emerging agentic security solutions employ concepts such as privilege delegation on behalf of humans, human-in-the-loop escalations and identity-based enterprise-wide control planes to restrict agentic behavior. Such concepts are likely to be anachronistic by 2030, perhaps by 2028! A new generation of distributed safeguards is needed to secure interlocking networks of multiagent systems that operate autonomously, explicitly designed to take humans (and their identities) out-of-the-loop. The good news is that the LLM technology that has made conventional security practices obsolete can also be used to establish new ways of authorizing agentic actions on the basis of business intent and business context instead of end user identification. Existing cybersecurity vendors are predictably extending the capabilities of their conventional solutions to address the challenges of agents in the workplace. This is a necessary but not sufficient survival tactic. The bigger existential threat is to ignore the fact that conventional practices need to be discarded altogether or radically redesigned to satisfy the unique security requirements of a predominantly agentic workplace. The intent of this article is to accelerate the realization that conventional workplace paradigms are vanishing – rapidly and irrevocably. Conventional thinking about security principles and practices needs to vanish as well.
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development