{"id":363004,"date":"2025-11-07T15:10:00","date_gmt":"2025-11-07T09:40:00","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=363004"},"modified":"2025-11-07T15:10:00","modified_gmt":"2025-11-07T09:40:00","slug":"the-shift-left-of-boom-making-cyber-threat-prevention-practical-again","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/the-shift-left-of-boom-making-cyber-threat-prevention-practical-again\/","title":{"rendered":"The Shift Left of Boom: Making Cyber Threat Prevention Practical Again"},"content":{"rendered":"<p class=\"v1MsoNormal\" style=\"text-align: left;\" align=\"center\"><strong><i><span lang=\"EN-US\">by John Dominguez, Senior Director of Product Marketing at <\/span><\/i><span lang=\"EN-US\"><i>Reach Security<\/i><\/span><\/strong><i><\/i><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">The old saying \u201cprevention is better than cure\u201d has lost currency in today\u2019s cybersecurity industry. Instead, security teams are advised to assume that the business has been breached and focus on threat detection, investigation, response, and recovery. Yet, during cyber incident post-mortems, it is not uncommon to find that the business owned the tool that would have protected it against the breach. The problem arose because it wasn\u2019t correctly configured before the incident happened, and no one knew this \u2013 or if they did, they didn\u2019t have the time or resources to fix it.<\/span><span lang=\"EN-US\">\u00a0\u00a0\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">We often say that hindsight has 20:20 vision and playing a blame game after a breach is morale-destroying. What we need to do is flip the script and turn hindsight into foresight to make cyber threat prevention practical again. As an industry, we need to shift security left of boom and help businesses optimize the investments they have already made. That\u2019s easy enough to say, but harder to change in reality, especially if there is a lack of understanding around the current environment.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><b><span lang=\"EN-US\">Security Governance Challenges for Today\u2019s Security Architects\u00a0<\/span><\/b><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">Security architects have an unenviable task on their hands. They are custodians of a vast cybersecurity tool stack that has usually grown organically with point solutions added as new threats emerge. It isn\u2019t unusual to find as many as 75 different tools in use in a single organization.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">And guess what? Each of those tools gets patches and updates delivered on a regular basis. No vendor wants to leave their solution with a vulnerability, so they push out patches and updates as fast as possible, leaving it to their customers to ensure they\u2019re properly applied and that new features are fully implemented and don\u2019t create unintended risk.\u00a0To illustrate the administrative load of patches and updates, we counted 380 new features released in 2024 by the top 20 security tools in the market alone.\u00a0Each tool offers around 20 independent controls that can be implemented, which results in an almost infinite number of combinations of new variables that a security team must digest every year. It just isn\u2019t sustainable \u2013 either the team is overwhelmed with work, risking mistakes and burnout, or decision paralysis sets in, meaning the business is being put at risk by the very tools it has purchased for the purpose of protection.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">Visibility is another challenge. Often, security tools don\u2019t talk to each other, leaving a lot of valuable data stuck in siloes rather than being accessible as a resource to help harden systems and prevent attacks.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">A further dimension to the visibility challenge is the ownership and management of different components of preventive security. Identity and access management tools, for example, may be owned and managed by the IT team. This can make it difficult for security architects to gain insight into their set-up and licensing terms to understand the capabilities available.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">Simply identifying all these tools, figuring out their configurations, and tracking their coverage is a full-time task \u2013 and with constant updates, it can be an endless process, like painting the Golden Gate Bridge. No sooner have you finished than you must start again. Naturally, in such a fragmented environment, delivering meaningful risk reduction, and reporting it in terms that boards will understand, is yet another challenge.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><b><span lang=\"EN-US\">Practical Threat Prevention: An Agentic AI Application<\/span><\/b><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">The outcome of these combined challenges is a reactive approach that is always one step behind adversaries. To shift cybersecurity left of boom and adopt a proactive, preventive strategy, organizations:<\/span><\/p>\n<ul>\n<li class=\"v1MsoListParagraphCxSpFirst\" style=\"text-align: left;\"><span lang=\"EN-US\">Need to maximize value from the security investments they have already made and make sure they aren\u2019t paying for features they don\u2019t use.<\/span><\/li>\n<li class=\"v1MsoListParagraphCxSpMiddle\" style=\"text-align: left;\"><span lang=\"EN-US\">Require meaningful and timely visibility over where and how their systems are exposed or misconfigured.<\/span><\/li>\n<li class=\"v1MsoListParagraphCxSpLast\" style=\"text-align: left;\"><span lang=\"EN-US\">Need a route to measurable risk reduction that uses existing resources \u2013 tools and personnel \u2013 effectively.<\/span><\/li>\n<\/ul>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">Solutions to parts of this problem already exist in the shape of exposure assessment platforms (EAP). These analyze systems to identify misconfigurations that could lead to a breach, but they typically deliver static reports that simply list identified exposures. They are missing context around what exposure means to the business. For example, rather than a basic alert about phishing risk, it is useful to understand if certain individuals or business divisions are being disproportionately targeted. That way, remediation actions can be more holistic, such as educating those employees to be vigilant, alongside tuning phishing defence tools.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">Another missing element is prioritization. Not all threats carry equal risk of being exploited, so when you\u2019re deciding where to allocate limited resources, it is valuable to know what should be fixed first. And on the subject of fixing issues, exposure management software won\u2019t tell you how and where to fix the problem it has identified, creating an administrative burden on teams who now must research and allocate fixes.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">It is these \u201cnext steps\u201d of contextualization, prioritization, and fixing that an agentic AI solution can elegantly and effectively address. Consider an agent that analyzes all those tools and systems for misconfigurations, prioritizes them based on highest risk, then creates a ticket specifying how and where the fix needs to happen, and adds it to the organization\u2019s existing task management tool. An organization that is especially AI-confident could even permit the agent to carry out fixes in a staged environment, so the team simply must check it before pushing it live.<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">Agentic AI for security operations offers security teams an opportunity to become proactive, rather than remaining stuck in a reactive spiral that has become the status quo. It can help security architects overcome tool sprawl to gain clarity over risk posture and not just surface hidden risks, but address them, too. It also allows for continuous monitoring to identify when configurations drift out of the optimal state, and that\u2019s a huge advantage because it addresses the \u201cmoving target\u201d nature of cyber risk management, recognizing that systems evolve. \u00a0\u00a0<\/span><span lang=\"EN-US\">\u00a0<\/span><\/p>\n<p class=\"v1MsoNormal\" style=\"text-align: left;\"><span lang=\"EN-US\">The next era of cybersecurity must build on the investments in tools and infrastructure that we\u2019ve already made, by leveraging them more intelligently to stem the tide of preventable breaches. It\u2019s time to shift the focus back on prevention, not just detection and response. Agentic AI offers a transformative opportunity to proactively harden systems and close the gaps that attackers expect to be able to exploit.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by John Dominguez, Senior Director of Product Marketing at Reach Security\u00a0 The old saying \u201cprevention is better than cure\u201d has lost currency in today\u2019s cybersecurity industry. Instead, security teams are advised to assume that the business has been breached and focus on threat detection, investigation, response, and recovery. Yet, during cyber incident post-mortems, it is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":{"0":"post-363004","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/363004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=363004"}],"version-history":[{"count":1,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/363004\/revisions"}],"predecessor-version":[{"id":363005,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/363004\/revisions\/363005"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/24832"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=363004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=363004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=363004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}