• Latest
  • Trending
The Limitations of rules-Based Cybersecurity

The Limitations of rules-Based Cybersecurity

June 22, 2022
Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Tuesday, 28 April, 2026
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

The Limitations of rules-Based Cybersecurity

by ITECHNEWS
June 22, 2022
in Leading Stories, Opinion
0 0
0
The Limitations of rules-Based Cybersecurity

Imagine a large financial services company that uses a mix of rules-based Cybersecurity platforms, Y and Z. Each of these has value, but even taken all together, they are unable to deliver a clear, complete picture. Limitations include:

●  Manual data correlation

YOU MAY ALSO LIKE

French Telco Orange Hit by Cyber-Attack

ATC Ghana supports Girls-In-ICT Program

●  Manual extraction and normalization from multiple sources

●  Partial, disparate data insights

●  Inability to decipher real-time network behavior

Organizations generally choose between one of two models:

  1. Extracting, transforming, and manipulating data in its own proprietary silo and then providing human intelligence with comparative analysis and anomaly detection.
  2. A data-agnostic approach that uses AI and threat investigation intelligence in advance of aggregation and normalization.

Both approaches have merit, but again, neither deliver a whole picture view of organizational data.

One central and often overlooked factor is that CloudTrail information doesn’t provide access or visibility into things like user behavior or precise application access behavior. CloudTrail information is limited to entity information — for example, access denied instances and geographic markers. Trying to look beyond the IP address is an endeavor with a very limited scope.

Holistic insight into how high-level information is tied to specific accounts users is central to launching an effective security strategy. Unfortunately, all too often, SOC analysts find themselves applying human intelligence and comparing spreadsheet data to arrive at potential correlative values that may or may not be helpful or even accurate.

At the heart of the issue is the fact that creating silo-based cloud data is not a reasonable long-term solution. It’s simply another arm of legacy solutions involving siloes for sources like network traffic data and log data. The thought is that somewhere along the line, a tool will marry siloed data together and make sense of it — for a hefty price, on top of the price customers pay to store data in expensive, duplicative formats.

Scale and Scope Limitations Inherent to Traditional Cybersecurity Solutions

Traditional Cybersecurity notoriously has issues dealing with economies of scale, a significant problem when it comes to the ever-cascading flow of generated data flowing to and from cloud environments. Hybrid solutions are architecturally and technically complex, and yesterday’s security solutions weren’t designed in the emancipation of the veritable fire hoses of data and busy data pipelines modern organizations have on tap.

Customers are forced to consider business problems based on the data available to them. The reality is that data stored in multiple data formats — cloud, log, or network data — is inherently challenging to analyze. Customers want to solve problems like identifying and understanding anomalies or account access behaviors by correlating anomalous behaviors of specific accounts with other parameters like geography or ingress and egress points, but few rules-based Cybersecurity tools have the ability to do that without a great deal of manual data massaging and manipulating.

Customers have been forced to extract, transform and normalize data from multiple data sources and add to it or manually correlate it in order to pull out relevant information about anomalous behavior. This set of circumstances is a common and significant industry-wide problem.

A data-agnostic platform like MixMode can take the most advantage of relevant data that doesn’t exist within disparate data streams, without regard to the significant difference in data volumes, perform automated correlative analysis, real-time threat and anomaly detection. MixMode frees organizations from multi-platform tech that is doing little to help them derive value and meaning from their expensive data stores.

Disparate Data Type Problems

Data type matters and siloed data is frequently of little value on its own. For example, flow log and CloudTrail data alone do not provide a full picture view of threat and anomaly intelligence. As a result, organizations routinely arrive at the wrong conclusions about the implications of siloed data and related behaviors.

Taking a holistic view is a far more effective, efficient approach, but traditional Cybersecurity tools likeSIEM lack the capability to deliver that view. Ultimately, SIEM — even AI-enhanced SIEM — falls short in the modern era of computing because it’s based on fundamentally limiting mechanics. For AI to make the move from the researcher’s chalkboard to having a demonstrable impact in everyday life, the need to be able to explain ‘why’ it is making the decisions that it does becomes increasingly critical.

Unless operators are prescient enough to know exactly what questions they want to prioritize to each subset of data, their understanding of that data falls far short of an interconnected, collaborative big picture view. MixMode uses third-wave AI and extreme processing power to automatically identify and surface threats and anomalies regardless of data type, structure, or the questions clients are trying to answer from the start. The platform can even identify anomalous behavior in real-time, including zero-day attacks.

Source: Christian Wiens
Via: Security Boulevard
Tags: The Limitations of rules-Based Cybersecurity
ShareTweet

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025

Recent News

  • Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa July 29, 2025
  • French Telco Orange Hit by Cyber-Attack July 29, 2025
  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version