HomeCII/OTSecurity response times are hampered by widespread data silos

Security response times are hampered by widespread data silos

Published on

spot_img

According to a recent study conducted by Ivanti, a significant issue facing IT and security professionals is the existence of data silos within organizations. These data silos, reported by 72% of professionals, hinder collaboration and alignment between different departments, ultimately leading to increased security risks.

Leadership is identified as a crucial factor in addressing and resolving data silos within organizations. A lack of unified data leads to several challenges reported by IT and security professionals. These challenges include a decrease in security response times, weakened security posture, difficulties in collaboration on cybersecurity management, and struggles in making informed security decisions regarding software usage, device access, and system vulnerabilities.

Jeff Abbott, the CEO of Ivanti, highlighted the importance of leadership in overcoming data silos and fostering a more secure workplace. CIOs and CISOs often face conflicting priorities, balancing employee productivity with data security, which can create vulnerabilities and open the door to cyberattacks. Collaboration between these leadership roles is essential in promoting cross-functional data collaboration and enhancing overall security measures.

The study also found that data silos are a universal challenge for CISOs and CIOs, particularly in light of the increasing investments in artificial intelligence (AI). Seamless integration and accessibility of data are crucial for leveraging AI technologies effectively and strengthening an organization’s security posture.

In addition to data silos, the study also highlighted the ongoing issue of unauthorized Bring Your Own Device (BYOD) practices in the workplace. IT and security teams struggle to track and manage personal devices used by employees, leading to potential security risks. Despite policies against BYOD, a significant percentage of employees admit to using personal devices for work-related tasks, often without their employers’ knowledge.

Furthermore, the study brought attention to the lack of awareness among office workers regarding the capabilities of AI, including the ability to impersonate voices. As AI technologies continue to evolve, security professionals express concerns about the increased threat posed by AI-powered attacks. However, a significant portion of professionals do not have a documented strategy in place to address these risks, highlighting the need for proactive measures to mitigate AI-related security threats.

In conclusion, the report emphasizes the importance of alignment between CIOs and CISOs in addressing security mandates and operational challenges. By working together to eliminate data silos, improve collaboration, and enhance overall security posture, organizations can better prepare for the evolving cybersecurity landscape and mitigate potential risks effectively.

Source link

Latest articles

Google Reveals Details on Chromium Bug That Can Transform Browsers into Bots

Security Flaw Discovered in Service Worker Feature of Chrome’s Background Fetch API A recently uncovered...

Trust3 AI Introduces MCP Security for AI Agents

Trust3 AI Unveils MCP Security: A Focus on Securing AI Deployments In a significant move...

RondoDox Botnet Takes Advantage of 2018 Vulnerability in Asus Routers

Botnet Operators Exploit Long-Standing Flaw in Asus Routers Date: May 22, 2026 Author: Greg Sirico The landscape...

Microsoft announces plans to make AI safe for work in your browser

Microsoft Edge for Business: Enhancing Security and Efficiency in the Corporate Environment Microsoft has recently...

More like this

Google Reveals Details on Chromium Bug That Can Transform Browsers into Bots

Security Flaw Discovered in Service Worker Feature of Chrome’s Background Fetch API A recently uncovered...

Trust3 AI Introduces MCP Security for AI Agents

Trust3 AI Unveils MCP Security: A Focus on Securing AI Deployments In a significant move...

RondoDox Botnet Takes Advantage of 2018 Vulnerability in Asus Routers

Botnet Operators Exploit Long-Standing Flaw in Asus Routers Date: May 22, 2026 Author: Greg Sirico The landscape...