• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

The Eternal Battle Between Hackers and Cybersecurity

Every week there is a new cyberattack plaguing companies and individuals, and even as cybersecurity is bolstered, hackers continue to evolve.

September 12, 2018 Jonathan Blackwood 1 Comment

Proofpoint CISO, CISOs cyberattack
Gorodenkoff/stock.adobe.com

It always seems that the hacker is ahead of the organization being attacked. Every week we hear about a new ransomware, malware, DDoS, or other attack that has put organizations – or their customers – at risk. In fact, we write about these attacks every week in our “Who Got Hacked” series.

There is an eternal struggle between hackers and cybersecurity experts. In the digital arms race, technology is invented to prevent the latest attacks, and new attacks are invented to thwart that technology. It takes a special combination of the right tech, the right policies, and the right education to get ahead of threat actors.

There are a number of issues in play when you consider the prevalence of cyberattacks in the digital age.

“Threat actors are becoming more and more sophisticated in their methods and how they’re looking to attack and target a number of organizations,” says Jeremy Samide, CEO of Stealthcare.

We’ve seen a shift from financial services to healthcare organizations to law firms because of the type of information that they have. However, as IT continues to change, a lot of these threat actors are targeting these organizations in order to exploit vulnerabilities based on application error, human error in design and architecture, and in other software and security vendors. This gives them an advantage.

An Ongoing Battle of Cybersecurity

It’s almost a situation of there being too many holes to plug.

“When you look at large organizations, you look at the attack surface,” says Samide. “As the organization gets larger, there’s more information, data pockets, entrance and egress points in the organization that need to be covered.”

In organizations with multiple offices and facilities, the attack surface gets larger. Any time an organization brings a new application online, or opens a new office, they are more connected, and there is more opportunity for hackers to look for vulnerabilities.

You can’t tell a company to stop growing, of course, but there are steps to be taken.

“It’s really a combination of the people, the process, and the technology,” says Samide. “They’re all connected. You can’t just throw technology at a solution. It doesn’t work. You have to build security through the process and culture, along with technology.”

Cybersecurity is a mindset. It’s a design that needs to be focused in the development of an organization – to implement security and then enforce security so that there is still reasonable access to the application.

The Cybersecurity Technology Factor

In the hyper-connected world, we have to look at implementing new technology from two standpoints – the functionality for the business from a requirement standpoint, and a security standpoint.

That’s likely different stakeholders from different departments getting involved. In fact, the different stakeholders need to get involved. They need to come together to look at the functional requirements along with the technical requirements to determine the proper solution for the organization.

Take the case of the Internet of Things, for example a manufacturing facility. Putting sensors that measure different variables during the manufacturing process can be a great thing. It can alert the organization to different problems that may arise in real time. It can also provide layers of data and analysis that inform the business – called Business Intelligence – and provide a better yield in following manufacturing cycles. However, these devices are connected to the network, and open up new avenues by which threat actors can enter the network to steal data.

Related: My TD Podcast – Jeremy Samide Talks Cybersecurity

The game here isn’t to find the balance as much as it is to weight the pros and cons.

“They need to design something that works for the business – that can create that intelligence to them to create that advantage,” says Samide, “But they also need to design the security architecture around that to mitigate the risks involved in adding that new type of technology to their systems.”

Once you introduce a new technology you need to do a risk assessment, look at the exposures, and then design something that can mitigate the risk while still providing the business with what they need.

The Future of Cybersecurity

“I think we’re still in the infancy stages of it,” says Samide, “I do believe that it’s going to get worse before it gets better.”

State sponsored cyberattacks are growing. Virtually all nations, all sovereign governments, and some hacker collective groups and terror organizations are starting to step up their game as they see cybersecurity as a major weapon. It’s becoming more sophisticated and targeted. In our hyper-connected world this is where the warfare will be played.

It’s all about intelligence, data, and connecting dots. You need to create a 360-degree picture of an organization, and having that information is power. The theft of information, therefore, is power as well. Hackers are looking to sell your information to competitors, or sell the financial information of your clients to the highest bidder. That’s what every organization, large or small, is up against.

“I think it’s going to be an ongoing battle,” says Samide. “Technology will be perfected on the defensive side, and part of that is the approach we’ve taken with our platform – the proactive approach. Threat intelligence, understanding what the threat actors are doing.”

Things like machine learning and artificial intelligence will be game changers, as will the advent of quantum computing (from an encryption standpoint). However, as those technologies grow on the security side, threat actors will start to use them as well. So it may always be a game of cat and mouse – a cyber arms race with each side battling forever.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Trackbacks

  1. Assess Your Cyber Risks and Vulnerabilities - My TechDecisions says:
    February 27, 2019 at 12:00 pm

    […] AV systems and, since his customers are technology purchasing decision makers, this topic of assessing cyber risks and vulnerabilities is near and dear to him. This column originally appeared on MyTechDecisions […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.