Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Overcome Challenges to Achieve Cybersecurity Automation
Cybersecurity

How to Overcome Challenges to Achieve Cybersecurity Automation

Bill DoerrfeldBy Bill DoerrfeldDecember 13, 2022Updated:April 13, 20235 Mins Read
Facebook Twitter LinkedIn Email
cybersecurity automation
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Today’s digital enterprises face escalating cybersecurity risks. The software supply chain is constantly under threat, as malicious actors target vulnerabilities within popular open-source packages and common dependencies. Cloud-native threats — misconfigurations, insecure defaults, and leaked keys, among others — persist. In addition, most organizations are ill-equipped for the newfound ubiquity of web APIs and their unique access control repercussions.

If you think that’s a lot to respond to manually, you’re not alone! To increase cybersecurity response across the board, enterprises continue to turn to automation for areas like threat detection and incident alerting. Yet, although organizations are automating various elements of their security strategy, they are still inconsistent where levels of security maturity, which vary widely from business to business, are concerned. Plus, technological incompatibilities continue to pose a common barrier to sweeping security automation initiatives.

ThreatQuotient’s “2022 State of Cybersecurity Automation Adoption” report analyzes the current condition of cybersecurity automation throughout today’s distributed enterprises. The study highlighted the key drivers behind cybersecurity automation and found that the majority of organizations experience pain problems implementing these initiatives. 

Below, I’ll review the study to pick out some key takeaways that security professionals should consider as they seek to treat cybersecurity as a business enabler — not a business inhibitor.

State of Cybersecurity Automation

First off, it’s clear that cybersecurity automation is of growing significance to information technology (IT) and security professionals. The study found that 68% say cybersecurity automation is important. This attitude will likely direct purchasing decisions in the coming year, as 98% have increased their automation budgets.

Threat intelligence management and incident response are some of the most popular cybersecurity automation use cases. Yet, the report found that alert triage is lagging in adoption — only 18% of respondents are automating alert triage. ThreatQuotient defines alert triage as: 

“The process of efficiently and accurately going through alerts and investigating them to determine the severity of the threat and whether or not the alert should be escalated to incident response.”

Application logs and monitoring tools produce a ton of data, so much so that engineers are often left drowning in a sea of observability data. It can be challenging to sift through alerts to separate false positives from actual incidents. As such, increased automation for alert triage is an important area to decrease manual review time and prioritize security incidents. Streamlining the response process is one way to meet performance objectives and reduce mean time to recovery (MTTR).

Challenges

Although cybersecurity automation sounds like an easy win, getting there is a challenging prospect. 97% report difficulties in rolling out automation initiatives. According to respondents, the top roadblock is technology issues — 21% say technology issues prevent automation. This is likely due to the complexity of managing different technological stacks and dealing with a slew of legacy toolsets across an enterprise. Other common barriers include skill shortages and a lack of management buy-in.

In gauging their automation maturity, the report found that the majority (62%) rate themselves at level two or three on a scale of one to five. These organizations might not yet have a security operations center (SOC) or security information and event management tools (SIEM) in place, suggests the report.

Another persisting quandary is determining the return on investment from security automation projects. The report found that businesses don’t have a quantitative measurement of success here — they tend to rely on qualitative measurements, like how resources are managed or staff effectiveness. A recent SANS cyber threat intelligence (CTI) survey also found that groups struggle to measure CTI program effectiveness. Whenever possible, quantitative measurements are more objective and preferred to weigh the ROI of a new solution.

Sector Contexts

In terms of drivers for cybersecurity automation, increasing efficiency and responding to the skills shortage rank as high reasons across the board. But these drivers change depending on the sector you’re in. For example, within government, most security automation initiatives are driven by regulation and compliance. And financial services companies are the most likely to consider cybersecurity automation important (75%). This makes sense as financial services face the most threats as they hold highly valuable payment data and personally identifiable information.

Interestingly, the perceived importance of cybersecurity automation has dropped significantly in the retail sector, from 82% in 2021 to only 50% this year. These changes could reflect changing priorities amid economic uncertainties. “Now, the environment has changed; retailers are facing the prospect of recession and belt-tightening, so there’s less room for new automation investment,” posited the report.

Final Thoughts

So, with all this information, how should CISOs and senior cybersecurity leaders respond? And, how can they introduce software development automation without it being more of a hindrance than an aid?

ThreatQuotient suggested some high-level recommendations for cybersecurity professionals to consider, summarized as follows:

  • Begin with use cases proven to show value.
  • Align context with relevant and high-priority events.
  • Simplify complexity with low-code/no-code automation platforms.
  • Adopt security platforms that cover a broad spectrum of automation.
  • Define clear metrics and directives to get management buy-in.
  • Standardize on platforms with open architectures.

The “2022 State of Cybersecurity Automation Adoption” queried 750 senior cybersecurity professionals in the U.K., U.S., and Australia from companies employing more than 2,000 people. Above, we covered some of the key takeaways from the study. For deeper information on sector-specific insights and regional and role-based snapshots, you can pick up the full copy here.

click here to join the conversation on linkedin

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

automation CISO Cybersecurity data featured financial services Industries Low code / No code
Share. Facebook Twitter LinkedIn Email
Bill Doerrfeld
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

Related Posts

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025

Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

June 26, 2025

The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!

June 26, 2025

Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More

June 25, 2025
Add A Comment

Comments are closed.

Recent Posts
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System
  • The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!
  • Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More
  • Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.