Automation Isn’t the Savior You Think It Is

  1. Reliance on vendor “out of the box” technology — because when you have nothing, you take what you can get. I shouldn’t have to explain why this is problematic. Your vendors don’t know your organization, your staff, your particular quirks, or organizational challenges. Simply relying on out-of-the-box solutions for security automation creates a wildly inefficient, poorly implemented, and immature organization. Even if you pay a ton of money to a consultant to “customize” the technology to your environment, remember that you’re now beholden to that person to repeat that task regularly because your business is not static and changes regularly.
  2. Predictable in an undesirable way — because attackers know how out-of-the-box security tools work; they buy them too! Without adaptation and customization, your security organization is predictable and thereby rather easily manipulable and able to be bypassed. Evidence of this is all over the news, literally every single day.
  3. Immature — because chaos with a lot of technology is still chaos. It’s just very expensive chaos with pretty dashboards. Maturity is critical to security and having well-designed processes is fundamental to maturity.
  1. Are we interested in automation to scale and mechanize our existing mature processes, or are we looking for the tools to build processes for us?
  2. Do the tools we’re thinking of implementing support our processes or are we going to change how we operate to accommodate the tools?
  3. Does the automation technology we’re interested in purchasing adapt quickly and easily as our processes change?

--

--

--

I’m Rafal, and I’m a 20+ year veteran of the Cyber Security and technology space. I tend to think with a wide-angle lens, and am unapologetically no-bullsh*t.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

If you have been in the internet marking business for a long time dealing with your own websites…

Windows Hello Facial Recognition

Astro.Ind Features and Rarity

MAGNUS 업그레이드 완료

KryptonProtocol and updated IFO news

Cloning Fingerprints Like A Boss: 101 Edition

Changes made to ‘Token Release Schedule’ disclosure

⁉️⁉️Why should you join Hora Staking?⁉️⁉️

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rafal Los

Rafal Los

I’m Rafal, and I’m a 20+ year veteran of the Cyber Security and technology space. I tend to think with a wide-angle lens, and am unapologetically no-bullsh*t.

More from Medium

The Advent of Cyber 3 (2021) Day 2

The Human Resource Factor: How to Protect Employees in the Digital Age

Who can reset the CISO’s password?

What are the risks of IoT and Digitization to Cybersecurity?