CISOs: Throwing Cash at Tools Isn’t Helping Detect Breaches

* [Сloud Security](/cloud-security)* [Cybersecurity Analytics](/cybersecurity-analytics)* [Cyber Risk](/cyber-risk)* [Cybersecurity Operations](/cybersecurity-operations)CISOs: Throwing Cash at Tools Isn’t Helping Detect Breaches CISOs: Throwing Cash at Tools Isn’t Helping Detect Breaches=======================================================================================================================A survey shows three-quarters of CISOs are drowning in threat detections put out by a sprawling stack of tools, yet still lack the basic visibility necessary to identify breaches. ![Picture of Becky Bracken, Senior Editor, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7cc305604c75fd2c/64f1538c8762bf882d6b8d9b/BeckyB.jpg?width=100&auto=webp&quality=80&disable=upscale ‘Picture of Becky Bracken, Senior Editor, Dark Reading’) [Becky Bracken, Senior Editor, Dark Reading](/author/becky-bracken)October 18, 2024 2 Min Read ![CISO working in SOC](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt05c9be3d9ff11a48/6712b3aba792d278940ad9d1/CISO_Alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale ‘CISO working in SOC ‘) Source: Kjetil Kolbjørnsrud via Alamy Stock Photo [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches)[](/cdn-cgi/l/email-protection#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)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches&title=CISOs%3A%20Throwing%20Cash%20at%20Tools%20Isn’t%20Helping%20Detect%20Breaches) Global information security spend is projected to reach $215 billion by the end of 2024. But a new survey of chief information security officers (CISOs) shows that all that cash might not have bought the peace of mind they hoped for. In fact, 44% of CISOs across the globe reported missing a data breach in the past 12 months with existing tools.The top blind spot identified in the survey of 234 global CISOs was hybrid cloud infrastructure and data-in-transit, which eight out of 10 of those surveyed by Gigamon said is a ‘top concern.’ Gigamon’s report added that data-in-motion is where 93% of malware has historically hidden. Overwhelmingly, 84% of surveyed CISOs said getting visibility into this encrypted traffic was a top priority for the upcoming year.’Modern cybersecurity is about differentiating between acceptable and unacceptable risk,’ Chaim Mazal, CSO at Gigamon, [said in the survey report](https://www.gigamon.com/campaigns/hybrid-cloud-security-survey.html). ‘Our research shows where CISOs are drawing that line, highlighting the critical importance of visibility into all data-in-motion to secure complex hybrid cloud infrastructure against today’s emerging threats. It’s clear current approaches aren’t keeping pace, which is why CISOs must reevaluate tool stacks and reprioritize investments and resources to more confidently secure their infrastructure.’Related:[Fighting Crime With Technology: Safety First](/cloud-security/fighting-crime-with-technology-safety-first)The Cloud and Cyber Threat Observability—————————————-Deep observability into [hybrid cloud environments](https://www.darkreading.com/application-security/sloppy-entra-id-credentials-hybrid-cloud-ransomware) is top of mind for 82% of surveyed CISOs. And 85% of those surveyed would like to gain visibility into packet-level and application metadata. Boards too agree that this deep observability is critical, with 81% of CISOs reporting hybrid cloud infrastructure will be a budgeting priority in 2025.’Today’s CISOs recognize that security and observability are intrinsically connected,’ Stephen Elliott, group vice president, IT operations, observability, and CloudOps at IDC, said in the report. ‘The network provides a crucial layer of context that can inform security operations and vice versa, which is why modern security teams are leveraging network-derived intelligence and insights to understand the true impact of a threat and prioritize their responses accordingly.’But before CISOs start spending on new tools, they plan to get the most out of what they already have, according to the survey. Three-quarters of those CISOs surveyed reported being ‘overwhelmed’ by the growing number of tools and their alerts. So to get a better handle on hybrid [cloud data](https://www.darkreading.com/cloud-security/multi-factor-authentication-not-enough-to-protect-cloud-data) and infrastructure, for instance, 60% of CISOs said their top priority for 2025 will be to consolidate and optimize existing tools for that arena.Related:[Cloud, AI Talent Gaps Plague Cybersecurity Teams](/cloud-security/cloud-ai-talent-gaps-cybersecurity-teams) [](https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches)[](http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches)[](http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches)[](/cdn-cgi/l/email-protection#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)[](https://www.reddit.com/submit?url=https://www.darkreading.com/cloud-security/cisos-throwing-cash-tools-detect-breaches&title=CISOs%3A%20Throwing%20Cash%20at%20Tools%20Isn’t%20Helping%20Detect%20Breaches) About the Author—————-![Becky Bracken, Senior Editor, Dark Reading](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7cc305604c75fd2c/64f1538c8762bf882d6b8d9b/BeckyB.jpg?width=400&auto=webp&quality=80&disable=upscale ‘Becky Bracken, Senior Editor, Dark Reading’) [Becky Bracken, Senior Editor, Dark Reading](/author/becky-bracken)
[See more from Becky Bracken, Senior Editor, Dark Reading](/author/becky-bracken) Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. [Subscribe](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)You May Also Like*** ** * ** ***More Insights Webinars* [Social Engineering: New Tricks, New Threats, New Defenses](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_goog80&ch=SBX&cid=_upcoming_webinars_8.500001487&_mc=_upcoming_webinars_8.500001487)* [10 Emerging Vulnerabilities Every Enterprise Should Know](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cenu63&ch=SBX&cid=_upcoming_webinars_8.500001480&_mc=_upcoming_webinars_8.500001480)* [Simplify Data Security with Automation](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_rubr114&ch=SBX&cid=_upcoming_webinars_8.500001488&_mc=_upcoming_webinars_8.500001488)* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)[More Webinars](/resources?types=Webinar) Events* [State of AI in Cybersecurity: Beyond the Hype](https://darkreadingve.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6891&ch=SBX&cid=_session_16.500324&_mc=_session_16.500324)* [-[Virtual Event-] The Essential Guide to Cloud Management](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6833&ch=iwkSBX&cid=_session_16.500323&_mc=_session_16.500323)* [Black Hat Europe – December 9-12 – Learn More](https://www.blackhat.com/upcoming.html#europe?cid=_session_16.500321&_mc=_session_16.500321)* [SecTor – Canada’s IT Security Conference Oct 22-24 – Learn More](https://www.blackhat.com/sector/2024/?cid=_session_16.500320&_mc=_session_16.500320)[More Events](/events) ### Editor’s Choice[A laptop on the table with software update progress bar on screen ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt81a7f618010a2b64/670596bf65a1b709cc3914a1/update_fadfebrian_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)](/vulnerabilities-threats/5-cves-microsofts-october-2024-update-patch-now)[Vulnerabilities -& Threats](/vulnerabilities-threats) [5 Zero-Days in Microsoft’s October Update to Patch Immediately](/vulnerabilities-threats/5-cves-microsofts-october-2024-update-patch-now)[5 Zero-Days in Microsoft’s October Update to Patch Immediately](/vulnerabilities-threats/5-cves-microsofts-october-2024-update-patch-now) by[Jai Vijayan, Contributing Writer](/author/jai-vijayan) Oct 8, 2024 4 Min Read [Flags of Russia and Ukraine ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0fddb100c646e3db/66ff0062bdbb681da6f8cf23/Ukraine-Russia(1800)_Daniren_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/cyber-risk/eu-sanctions-sabotage-cyberattacks-russia)[Cyber Risk](/cyber-risk) [EU Plans Sanctions for Cyberattackers Acting on Behalf of Russia](/cyber-risk/eu-sanctions-sabotage-cyberattacks-russia)[EU Plans Sanctions for Cyberattackers Acting on Behalf of Russia](/cyber-risk/eu-sanctions-sabotage-cyberattacks-russia) by[Jennifer Lawinski, Contributing Writer](/author/jennifer-lawinski) Oct 10, 2024 1 Min Read [A face scan of Indian Prime Minister Modi ![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc30e3104f91e523a/6706d52d96ff5e14abce9d6b/Modi_face_scan-dpa_picture_alliance-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)](/threat-intelligence/ai-powered-cybercrime-cartels-asia)[Threat Intelligence](/threat-intelligence) [AI-Powered Cybercrime Cartels on the Rise in Asia](/threat-intelligence/ai-powered-cybercrime-cartels-asia)[AI-Powered Cybercrime Cartels on the Rise in Asia](/threat-intelligence/ai-powered-cybercrime-cartels-asia) by[Nate Nelson, Contributing Writer](/author/nate-nelson) Oct 10, 2024 4 Min Read Reports* [Managing Third-Party Risk Through Situational Awareness](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cybo171&ch=&cid=_analytics_7.300006016&_mc=_analytics_7.300006016)Jul 31, 2024* [2024 InformationWeek US IT Salary Report](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_ingg253&ch=sbx&cid=_analytics_7.300006014&_mc=_analytics_7.300006014)May 29, 2024[More Reports](/resources?types=Report) Webinars* [Social Engineering: New Tricks, New Threats, New Defenses](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_goog80&ch=SBX&cid=_upcoming_webinars_8.500001487&_mc=_upcoming_webinars_8.500001487)Oct 23, 2024* [10 Emerging Vulnerabilities Every Enterprise Should Know](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_cenu63&ch=SBX&cid=_upcoming_webinars_8.500001480&_mc=_upcoming_webinars_8.500001480)Oct 30, 2024* [Simplify Data Security with Automation](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_rubr114&ch=SBX&cid=_upcoming_webinars_8.500001488&_mc=_upcoming_webinars_8.500001488)Oct 31, 2024* [Unleashing AI to Assess Cyber Security Risk](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_dark71&ch=SBX&cid=_upcoming_webinars_8.500001492&_mc=_upcoming_webinars_8.500001492)Nov 12, 2024* [Securing Tomorrow, Today: How to Navigate Zero Trust](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7186&ch=SBX&cid=_upcoming_webinars_8.500001490&_mc=_upcoming_webinars_8.500001490)Nov 13, 2024[More Webinars](/resources?types=Webinar) White Papers* [The State of Asset Security: Uncovering Alarming Gaps -& Unexpected Exposures](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6965&ch=SBX&cid=_whitepaper_14.500005790&_mc=_whitepaper_14.500005790)* [Generative AI Gifts](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_senu28&ch=SBX&cid=_whitepaper_14.500005773&_mc=_whitepaper_14.500005773)* [SecOps Checklist](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_senu25&ch=SBX&cid=_whitepaper_14.500005771&_mc=_whitepaper_14.500005771)* [SANS 2024 Security Awareness Report](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6822&ch=SBX&cid=_whitepaper_14.500005770&_mc=_whitepaper_14.500005770)* [SANS Security Awareness Maturity Model](https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6823&ch=SBX&cid=_whitepaper_14.500005769&_mc=_whitepaper_14.500005769)[More Whitepapers](/resources?types=Whitepaper) Events* [State of AI in Cybersecurity: Beyond the Hype](https://darkreadingve.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6891&ch=SBX&cid=_session_16.500324&_mc=_session_16.500324)Oct 30, 2024* [-[Virtual Event-] The Essential Guide to Cloud Management](https://iw-resources.informationweek.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa6833&ch=iwkSBX&cid=_session_16.500323&_mc=_session_16.500323)Oct 17, 2024* [Black Hat Europe – December 9-12 – Learn More](https://www.blackhat.com/upcoming.html#europe?cid=_session_16.500321&_mc=_session_16.500321)Dec 10, 2024* [SecTor – Canada’s IT Security Conference Oct 22-24 – Learn More](https://www.blackhat.com/sector/2024/?cid=_session_16.500320&_mc=_session_16.500320)Oct 22, 2024[More Events](/events)

Related Tags:
NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 51 – Information

Blog: Dark Reading

Software Discovery: Security Software Discovery

Software Discovery

Associated Indicators: