Featured

Raytheon releases study on company satisfaction with IT security providers

Results of a Raytheon-commissioned study released on Monday found that organizations worldwide wait until they fall victim to a damaging cyber attack before engaging a provider of managed security services (MSS).

Two-thirds of survey respondents indicated that their organizations were reluctant to engage a vendor until they have experienced significant data loss from an IT security breach.

The survey, entitled “Don’t Wait: The Evolution of Proactive Threat Hunting,” surveyed 1,784 information security leaders in 19 countries about outsourcing network security activities. The survey also revealed that organizations are seeking more from their existing providers, including firewalls, intrusion detection and virtual private networks.

“Cybersecurity is not a waiting game, and organizations without the expertise and tools required to identify and respond to skilled adversaries need to understand that,” Jack Harrington, vice president of cybersecurity and special missions at Raytheon Intelligence, Information and Services, said. “The old approach waited for technology to flag known threats. In contrast, skilled hunters like those on our team proactively seek emerging threats and stop them before businesses suffer damage.”

Eighty-eight percent of respondents said that MSS is important to their overall security strategy, while 84 percent percent said that their provider did not offer proactive hunting services even though they effectively find the most insidious threats impacting their data.

“There is only one way to find the most sophisticated, damaging cyber threats attacking a company’s network: proactively hunt for them,” David Amsler, president of Raytheon Foreground Security, said. “Too many organizations today rely on reactive models and automated tools that attempt to detect threats through signature-, rule- or sandbox-driven models. The reactive approach is not enough to stop the determined and sophisticated adversaries which are most often the cause of significant damage or data loss.”

Alex Murtha

Recent Posts

Bipartisan effort calls for details on foreign attempts to infiltrate U.S. military bases

A group of seven U.S. representatives recently wrote to Defense Secretary Lloyd Austin in a…

1 day ago

House bill calls for AI task force within Cybersecurity and Infrastructure Security Agency

As more governments and businesses seek what artificial intelligence (AI) can offer, U.S. Reps. Troy…

1 day ago

Senators push to preserve procurement levels for attack submarines

A group of 14 U.S. senators recently called on the U.S. Senate Appropriations Subcommittee on…

2 days ago

House advances appropriations for Coast Guard operations through 2026

In approving the Coast Guard Authorization Act of 2024 (H.R. 7659), the House recently authorized…

2 days ago

Commerce Department blacklists 37 Chinese entities over quantum, spying concerns

The U.S. Commerce Department recently added 37 Chinese entities to the Export Administration Regulations (EAR)…

3 days ago

U.S. Sens. Peters and Britt propose modern, better-suited body armor for DHS personnel

In introducing the DHS Better Ballistic Body Armor Act (S. 4305) this month, U.S. Sens.…

3 days ago

This website uses cookies.