• Home
  • Agric
  • Sci & Tech
  • Health
  • Environment
  • Hausa News
  • More
    • Business/Banking & Finance
    • Politics/Elections
    • Entertainments & Sports
    • International
    • Investigation
    • Law & Human Rights
    • Africa
    • ACCOUNTABILITY/CORRUPTION
    • Hassan Gimba
    • Column
    • Prof. Jibrin Ibrahim
    • Prof. M.K. Othman
    • Defense/Security
    • Education
    • Energy/Electricity
    • Entertainment/Arts & Sports
    • Society and Lifestyle
    • Food & Agriculture
    • Health & Healthy Living
    • International News
    • Interviews
    • Investigation/Fact-Check
    • Judiciary/Legislature/Law & Human Rights
    • Oil & Gas/Mineral Resources
    • Press Freedom/Media/PR/Journalism
    • General News
    • Presidency
  • About Us
    • Contact Us
    • Board Of Advisory
    • Privacy Policy
    • Ethics Policy
    • Teamwork And Collaboration Policy
    • Fact-Checking Policy
    • Advertising
  • Media OutReach Newswire
    • Wire News
  • The Stories
Facebook Twitter Instagram
Trending
  • Lagos govt airlifts 200 pilgrims to Israel, Jordan
  • Lawmaker plans free healthcare for 10,000 constituents
  • Iran, beware the fangs of January, the scourge of February, the ides of March [II], by Hassan Gimba
  • Abia govt approves new climate change policy, prioritises disability inclusion
  • World Hijab Day: Group seek review of NYSC uniforms
  • Libya deports undocumented Nigerian migrants
  • My husband asks for sex 8 times every night, woman tells court
  • Naira posts week-on-week gain to ₦1,391/$ as external reserves strengthen
Facebook Twitter Instagram YouTube
AsheNewsAsheNews
  • Home
  • Agric

    How Corteva Agriscience is boosting South Africa’s farming system

    January 31, 2026

    AI-driven project targets climate resilient crops for farmers in Africa

    January 31, 2026

    FG empowers 40 cooperatives with farm inputs in Yobe

    January 30, 2026

    Katsina to host 3,750 housing units, aquaculture project financed by COSMOS

    January 30, 2026

    ActionAid empowers 12,000 FCT farmers with agroecology skills

    January 30, 2026
  • Sci & Tech

    Expert urges federal govt to tackle multiple taxation in telecoms sector

    January 31, 2026

    Airtel Africa mobile money transactions top $210bn as subscribers hit 52m

    January 31, 2026

    Nigeria, KOICA partner to drive digital transformation in public service

    January 30, 2026

    NDPC leads Abuja roadshow to promote data protection awareness

    January 30, 2026

    NOTAP backs Nigerian developers to $1m sales

    January 29, 2026
  • Health

    Lawmaker plans free healthcare for 10,000 constituents

    February 1, 2026

    Anambra seeks LG chairmen’s support for measles–rubella vaccination campaign

    January 31, 2026

    Kaduna eliminates Trachoma as public health threat

    January 31, 2026

    Kogi records milestone in fight against NTDs, halts treatment for Lymphatic filariasis

    January 31, 2026

    Bauchi introduces nutrition supplement to tackle child undernutrition

    January 31, 2026
  • Environment

    Abia govt approves new climate change policy, prioritises disability inclusion

    January 31, 2026

    LAWMA arrests cart pushers for illegal dumping on Lagos–Badagry expressway

    January 31, 2026

    YASIF, IBM train 15,000 Nigerian youths for green, digital economy

    January 31, 2026

    Kukah urges religious leaders to speak out against environmental exploitation

    January 31, 2026

    LASEMA holds retreat to honor responders, boost emergency preparedness

    January 31, 2026
  • Hausa News

    Anti-quackery task force seals 4 fake hospitals in Rivers

    August 29, 2025

    [BIDIYO] Yadda na lashe gasa ta duniya a fannin Ingilishi – Rukayya ‘yar shekara 17

    August 6, 2025

    A Saka Baki, A Sasanta Saɓani Tsakanin ‘Yanjarida Da Liman, Daga Muhammad Sajo

    May 21, 2025

    Dan majalisa ya raba kayan miliyoyi a Funtuwa da Dandume

    March 18, 2025

    [VIDIYO] Fassarar mafalki akan aikin Hajji

    January 6, 2025
  • More
    1. Business/Banking & Finance
    2. Politics/Elections
    3. Entertainments & Sports
    4. International
    5. Investigation
    6. Law & Human Rights
    7. Africa
    8. ACCOUNTABILITY/CORRUPTION
    9. Hassan Gimba
    10. Column
    11. Prof. Jibrin Ibrahim
    12. Prof. M.K. Othman
    13. Defense/Security
    14. Education
    15. Energy/Electricity
    16. Entertainment/Arts & Sports
    17. Society and Lifestyle
    18. Food & Agriculture
    19. Health & Healthy Living
    20. International News
    21. Interviews
    22. Investigation/Fact-Check
    23. Judiciary/Legislature/Law & Human Rights
    24. Oil & Gas/Mineral Resources
    25. Press Freedom/Media/PR/Journalism
    26. General News
    27. Presidency
    Featured
    Recent

    Lagos govt airlifts 200 pilgrims to Israel, Jordan

    February 1, 2026

    Lawmaker plans free healthcare for 10,000 constituents

    February 1, 2026

    Iran, beware the fangs of January, the scourge of February, the ides of March [II], by Hassan Gimba

    February 1, 2026
  • About Us
    1. Contact Us
    2. Board Of Advisory
    3. Privacy Policy
    4. Ethics Policy
    5. Teamwork And Collaboration Policy
    6. Fact-Checking Policy
    7. Advertising
    Featured
    Recent

    Lagos govt airlifts 200 pilgrims to Israel, Jordan

    February 1, 2026

    Lawmaker plans free healthcare for 10,000 constituents

    February 1, 2026

    Iran, beware the fangs of January, the scourge of February, the ides of March [II], by Hassan Gimba

    February 1, 2026
  • Media OutReach Newswire
    • Wire News
  • The Stories
AsheNewsAsheNews
Home»Defense/Security»The cybersecurity resource problem: 4 ways to get proactive, By Lucy Kerner
Defense/Security

The cybersecurity resource problem: 4 ways to get proactive, By Lucy Kerner

EditorBy EditorDecember 19, 2020No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

When it comes to cybersecurity, a lack of resources can be a bigger threat than the criminals who have their sights set on stealing organizations’ data, money, time, and reputation

Resources have always been a problem when it comes to cybersecurity. You are not always rewarded for doing security the way you are when you develop a new business application quickly. This usually leads to security teams being understaffed and overworked. At the same time, skilled cybersecurity professionals are in high demand, and there is significant turnover in cybersecurity positions.

Download Infographics: https://bit.ly/3gTZnoB

In fact, when it comes to cybersecurity, a lack of resources can be a bigger threat than the criminals who have their sights set on stealing organizations’ data, money, time, and reputation. This has long been true, but COVID-19 turned the cybersecurity resource challenge into a full-blown problem, causing security to be overlooked in many cases.

In the best of times—or, at least, more normal times—talented cybersecurity resources are difficult to find, expensive to procure, and hard to retain. The pandemic has exacerbated the cybersecurity skills shortage as organizations’ focus and resources have shifted to shoring up, or even building from scratch, work-from-home capabilities. Proactive security has been put on the back burner for many companies, exposing big gaps between the cybersecurity resources.

In a pre-pandemic study (https://bit.ly/3gRamPE) conducted by (ISC)2, an international, nonprofit membership association for information security leaders, the cybersecurity workforce gap in the United States was estimated to be nearly 500,000. By combining its US cybersecurity workforce estimates and gap data, the association found that the cybersecurity workforce needs to grow by 62% in order to meet the demands of US businesses today. Using the workforce estimate of 2.8 million based on the 11 economies it studied and a global gap estimate of 4.07 million, the association estimated that the global workforce needs to grow by 145%.

Indeed, respondents to the survey that was used to develop the study said that a lack of skilled/experienced cybersecurity personnel is their top concern, and that the gap puts their companies at moderate or extreme risk. Research for the Ponemon Institute’s 2020 Cost of a Data Breach Report (http://ibm.co/3npvD5I) began months before COVID-19 had widespread impact, but supplemental questions related to the potential impact of remote workforces due to the pandemic revealed that 76% of organizations predict that remote work will make responding to a potential data breach more difficult.

With the Ponemon research estimating that the average total cost of a data breach is $3.86 million, preventing a cybersecurity incident in the first place is critical. But all is not lost. Solving the cybersecurity resource problem outright is not going to happen right away, but there are things that organizations can do beyond adding more security bodies. Here’s how to strengthen your cybersecurity position.

1. Establish internal security training and certification programs

Savvy organizations realize that true cybersecurity requires a cultural shift. Essentially, some level of cybersecurity must be part of each employee’s responsibility. That’s not to say that your marketing director will be on the security front lines, of course, but every employee should take part in security education and certification programs. And that doesn’t mean that you can just create a PowerPoint presentation that you force employees to sit through so they can check off a box; it means developing meaningful and relevant programs that engage employees and help them understand the cybersecurity threat and their roles in mitigating it. Think about “lunch and learns,” mock breaches, and even escape rooms.

2. Encourage security cross-pollination

If security is everyone’s job, then security resources should not be limited to the IT department. Think about ways security can cross-pollinate within the organization. Just as security is infiltrating the development arena through the growing DevSecOps movement, security resources could be integrated into other areas, as well. This will not only develop company-wide understanding of security issues, but it will also encourage cross-collaboration and the opportunity to build security into processes, products, and services from the ground up.

3. Take a hard look at your security tooling

Many organizations have security tools they don’t really need or that are out of date and can’t support new technologies such as cloud, containers, or Kubernetes. This wastes time and money. For example, many companies are running legacy security tools designed to protect systems that are no longer used.

Companies also often have too many tools to keep track of, leading to redundant tooling and the inability to manage the growing number of tools. Also, many companies aren’t making full use of security tools that are already built into existing systems, such as the operating system, container platform, or security tooling provided by the cloud provider. A thorough inventory of existing security tooling will reveal what’s needed (and not needed) to address current security concerns.

4. Put a consistent automation strategy in place

With so many moving parts in place, no human or group of humans could ever fill every security hole. Indeed, as IT environments and the world around us become more complex, so do the security events facing IT teams. A consistent automation strategy can help organizations more effectively mitigate risks by reducing human errors, remediate issues, respond quickly to security alerts, and develop repeatable security and compliance workflows.

It’s important to note, however, that automation isn’t one product or even a collection of products. Organizations should look for an approach that overlays a consistent automation strategy across app dev, infrastructure, security operations, and so on. In fact, Ponemon’s Cost of a Data Breach Report noted that organizations with fully deployed automation—versus those with no automation deployed—realize a savings of $3.58 million in average total cost of a data breach.

Is the cybersecurity resource problem unsolvable?

It’s true that, realistically, the resource problem can’t be completely solved, but it’s a problem that you can effectively address and manage with proactive planning, strategic technology implementation, and widespread, ongoing, and engaging security awareness training and collaboration.

Kerner is Security Evangelist and Strategist, Red Hat (www.RedHat.com)

APO

AP0 Cybersecurity ICT Lucy Kerner resource problem
Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
Editor
  • Website

Related Posts

[VIEWPOINT] Why FG Should halt the persecution of Ozekhome, By Echika Ejido

January 30, 2026

Nigeria, KOICA partner to drive digital transformation in public service

January 30, 2026

Celebrating the quintessential Prof. Jafaru Makau Kaura as he bows out of Public Service, By Sammani Idris Kaura

January 28, 2026

Leave A Reply Cancel Reply

Lagos govt airlifts 200 pilgrims to Israel, Jordan

February 1, 2026

Lawmaker plans free healthcare for 10,000 constituents

February 1, 2026

Iran, beware the fangs of January, the scourge of February, the ides of March [II], by Hassan Gimba

February 1, 2026

Abia govt approves new climate change policy, prioritises disability inclusion

January 31, 2026
About Us
About Us

ASHENEWS (AsheNewsDaily.com), published by PenPlus Online Media Publishers, is an independent online newspaper. We report development news, especially on Agriculture, Science, Health and Environment as they affect the under-reported rural and urban poor.

We also conduct investigations, especially in the areas of ASHE, as well as other general interests, including corruption, human rights, illicit financial flows, and politics.

Contact Info:
  • 1st floor, Dogon Daji House, No. 5, Maiduguri Road, Sokoto
  • +234(0)7031140009
  • ashenewsdaily@gmail.com
Facebook Twitter Instagram Pinterest
© 2026 All Rights Reserved. ASHENEWS Daily Designed & Managed By DeedsTech

Type above and press Enter to search. Press Esc to cancel.