{"id":45353,"date":"2022-02-18T19:19:21","date_gmt":"2022-02-18T19:19:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33127\/WTF-Is-Our-Most-Critical-Cybersecurity-Resource-And-How-Can-We-Preserve-It.html"},"modified":"2022-02-18T19:19:21","modified_gmt":"2022-02-18T19:19:21","slug":"wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/","title":{"rendered":"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It?"},"content":{"rendered":"<p>A few years ago, I managed a user-experience designer who excelled at design but was wholly unfamiliar with the user end of cybersecurity software. It mystified him why I would overrule a straightforward aesthetic decision in favor of something less beautiful because it \u201cpreserved cognition.\u201d So I signed him up for a trip to sit among the people who spend long days staring across a dense constellation of screens, each one illuminating feeds of recent alerts from various cybersecurity products. The situation went catastrophically wrong but we all learned a lot.<\/p>\n<p><!--more--><\/p>\n<p>In case you\u2019re unfamiliar with the market, these cybersecurity tools were not what your parents might install on a Windows laptop. That\u2019s Consumer-grade tech versus what the industry calls Enterprise-scale cybersecurity for small to medium businesses and major international organizations. In 2020, Enterprise cybersecurity was thought to have total revenues around $133B according to Gartner, a number that could triple by 2028. These tools are expensive because they are complex and rich with information and frankly awesome, and because the price of not leveraging them can be enormous.<\/p>\n<p>The cybersecurity industry came late to embracing UX. Some say that, unlike Google and other tech leaders, it still hasn\u2019t. I was lucky enough to have spent almost 20 years in Enterprise cybersecurity making the case for a strong UX practise. I had a deep technical background\u2014with tens of patents awarded in the field\u2014alongside a range of creative skills\u2014winning major industry awards for books and games I\u2019d designed. Most crucially, I\u2019d learned how the tools our industry expensively builds and expensively sells are capable of failing our customers in expensive ways. It ends up having little connection to how much the products cost to buy, and everything to do with how much\u2014or rather what resource\u2014the products cost to use.<\/p>\n<p>What I\u2019m talking about is not time or money. It\u2019s cognition, and every person\u2019s limited allotment of it may be our most critical cybersecurity resource. Today we\u2019ll look at why, and what can be done.<\/p>\n<h2>The Problem<\/h2>\n<p>Customers can\u2019t extract the full value of Enterprise cybersecurity tools unless the user experience is baked into the development. Too often, product development starts with the visual presentation, mocking up what looks good and what could go where; or alternately, a designer is brought in near the end of development to make things look pretty. Meanwhile, the people who actually manage these tools are tasked with a job that is cognitively, well, unusual, and nice presentation alone won\u2019t help them. They spend thankless days poring over low-level alerts from the usual suspects, silencing bursts of irritating false positives while being ever vigilant for the rare Hollywood-style cyber-trouble. As boring as it may seem, reading these digital tea leaves is not for the faint of heart.<\/p>\n<p>New to cybersecurity, our designer did not understand this dull but crucial work. Consequently, his training in clean, calm visual presentation often taxed the cognition of users, making it harder to extract value from the product.<\/p>\n<p>Here\u2019s an example of efficiency from a UX standpoint. Sometimes we expose long strings of \u201cgarbage\u201d letters and numbers stacked row after row in table cells. The designer naturally hid them in \u201chover over\u201d pop-ups to tidy the screens. Clean means more efficient, right?<\/p>\n<p>It was not. Analysts often depend on those squiggly messes. Sadly for white space, it can be crucial to quickly scan an unreadable mess\u2014What if all the garbage values are the same, or all but three are different? Having spent time on customer sites, I knew the efficiency of exposing \u201cgarbage\u201d sometimes, even if it\u2019s ugly.<\/p>\n<p>Even though machine learning has reduced the importance for certain kinds of complexity to be exposed as prominently as we did several years ago, the practise still has some use. Humans can still be quite valuable pattern-detectors.<\/p>\n<h3>Using colour<\/h3>\n<p>UX problems also arise when designers are not allowed to focus on the user\u2019s sense of visual hierarchy. One example is the use of colour. In designing the user experience of cybersecurity products, colour must be reserved to direct human attention; no colour is more important in this context than red. Across several organizations, I\u2019ve gone to the mat to use red in our user interfaces only for critical problems.<\/p>\n<p>Red has always been of primary importance to human minds. When your friend suddenly has a wet splash of red on them where they didn\u2019t a moment ago, humans have historically found it alarming. Across literature in every language, red is the first color to be named. (\u201c\u2026red is always first and blue is always last.\u201d <a href=\"https:\/\/www.wnycstudios.org\/podcasts\/radiolab\/segments\/211213-sky-isnt-blue\">Why Isn\u2019t the Sky Blue; Radiolab, 2012<\/a>.)<\/p>\n<p>As someone who worked for a company whose logo was itself red, I spent years cajoling some unhappy marketing people to create a black version of our logo for our products to use on screen. For the people whose job is to respond to red things, filling the top fifth of the screen with red corporate branding can slow their response time. They could overlook the alert entirely. Often by the time a critical alert pops up on your screen, it\u2019s too late. The horse has left the barn, and the barn is on fire. Still, acting within minutes could mean the difference between a quiet afternoon and a corporation-altering disaster, as we will see.<\/p>\n<h3>Context switching<\/h3>\n<p>UX problems also arise when designers burden users with unnecessary context-switching. <a href=\"https:\/\/news.nd.edu\/news\/walking-through-doorways-causes-forgetting-new-research-shows\/\">Researchers at the University of Notre Dame ran a study<\/a> where people stood at a table on one side of a long room and arranged some elements. Then they walked across the room to complete the task at another table. They did well until the researchers partitioned the room, leaving a doorway between. After that, completion rates plummeted.<\/p>\n<p>The study invoked that common human experience of walking to another room to get something and forgetting what it was upon arrival. You didn\u2019t lose your mind; you gained a partition, and an additional context to inhabit.<\/p>\n<p>The researchers proposed that our physical location defines the larger context in which our minds operate. As we change locations, our minds dehydrate our previous context to focus instead on our new context. You leave your living room to make popcorn, and the moment you cross the kitchen\u2019s threshold you forget why you\u2019d gone in there. Walk back to the living room and your mind rehydrates that context, and you remember, popcorn!<\/p>\n<p>Here\u2019s where it gets weird. The researchers repeated the study but had subjects sit in front of computers controlling a human figure on screen. In a long virtual room with a table at each end, people did okay, but when the researchers placed a virtual partition in the virtual space, completion rates tanked again.<\/p>\n<p>A cybersecurity system with a rich range of functionality can certainly look complicated; often they\u2019re designed from a simplistic perspective, with one table on each screen\u2014essentially one view for a table of settings, another for a table of security events. Although this approach may make a developer\u2019s life easier and appear efficient, navigating these individual contexts with a virtual wall between them takes a serious toll on the minds of cybersecurity professionals. Reviewing those security events and repeatedly checking them against the bundle of settings is like walking from kitchen to living room, trying to remember the popcorn. And assume you\u2019d have to drill down into yet another view to see the details of each event.<\/p>\n<p>Unfortunately, the designer I managed would see the results of that problem first-hand. I sent him off to a large customer site to sit among those awash in monitor light. What he learned was crucial to his grasping cognition and context.<\/p>\n<p>He spent two days shadowing a senior cybersecurity analyst, an older man with a lot of experience. The first day he toured the facilities, and saw the massive amount of networking hardware, with cybersecurity appliances from various vendors racked and stacked alongside the machines that ran the business.<\/p>\n<p>The next day he sat near the senior analyst\u2019s workstation, peppering him with questions about workflow and priorities. After a long silence, the analyst waved to get the designer\u2019s attention.<\/p>\n<p>\u201cYou know what really bothers me? This.\u201d He pointed at what looked like a dense spreadsheet but was actually one of our user interfaces. \u201cThis right here, and this.\u201d He pointed to a different display, at a different user interface\u2014newly one of ours from a recent acquisition. \u201cThese things use different words for the same thing.\u201d The customer\u2014the kind of seasoned analyst who\u2019s basically a muse for cybersecurity products\u2014was pointing out failures of consistency. These rob people of cognition because they force the user to keep switching models and contexts.<\/p>\n<p>Even worse, he went on, it wasn\u2019t just that the words are different\u2014the taxonomy wasn\u2019t the same. Something as simple as \u2018source\u2019 and \u2018target\u2019 weren\u2019t always consistent.<\/p>\n<p>\u201cIf my computer connects to Google, then I\u2019m the <em>source<\/em> of the connection. But in this other product of yours, if I download something bad from my inbox on Google, then I\u2019m the <em>target<\/em> of the event.\u201d<\/p>\n<p>Although his understanding of the many products from the various vendors was deep, he still had to click down into little pockets through to other views to verify things. \u201cSome days are easier than others, but sometimes it\u2019s too much,\u201d he said with exasperation.<\/p>\n<p>He pointed at each display. \u201cAll I know is that between this event over here and this other one over there, I feel like I\u2019m missing something.\u201d His user experience was like walking through a house with too many rooms.<\/p>\n<p>The designer then told me the analyst had been right: the two events had been reporting on different facets of the same dark crystal. By the time the analyst caught it, the barn was on fire.<\/p>\n<p>In just a few days, the whole corporation was offline. A group known to be associated with a malicious nation-state would dump corporate email, sensitive documents and other intellectual property for all the world to see. They had to build a brand new network infrastructure, parallel but separate from what already existed\u2014everything new from service providers and routers to firewalls and switches, email and file servers\u2014as well as every computing device used by everyone across the company. I have no idea what that cost. I wonder if they knew\u2014forget about time and materials; what were the opportunities lost?<\/p>\n<p>Many things could have prevented this or stopped the attackers as they infiltrated the network, or as they exfiltrated terabytes of data\u2014which was what I believe the analyst had spotted in a twist of taxonomy. A shocking amount had begun to move in the wrong direction\u2014all because we, as human beings, have only small bits of brain power to focus on any one problem at a time.<\/p>\n<p>Our most precious cybersecurity resource is our own cognition. Our own brains flatter us, and work hard to maintain the illusion of greater intelligence. But the cybersecurity tools which were supposed to secure that company robbed that man of his cognition, slicing it up into so many different silos that he could no longer track across them. He even knew it was happening, and articulated it clearly.<\/p>\n<h2>A UX solution\u2014the other way around<\/h2>\n<p>The typical way I\u2019ve seen Enterprise-scale products designed is to begin with a simple visual design, an idea for the presentation they\u2019ll ask their developers to target. Then people refine the <em>presentation,<\/em> often to make the experience more <em>efficient<\/em>. Early customers ask for more information or additional views and <em>context<\/em> is added\u2014until finally, the end-user\u2019s <em>goals<\/em> are more fully understood. New workflows are imagined with new <em>controls<\/em> imagined to support them as the product evolves over time.<\/p>\n<p>There\u2019s a lot in favour of this approach, in that the experience employs a <em>presentation<\/em> to be <em>efficient<\/em> in relating <em>contexts<\/em> in which <em>controls<\/em>, once fiddled, satisfy a user\u2019s <em>goals. <\/em><\/p>\n<p>I propose, though, that it would be cheaper and more effective to turn this process around.<\/p>\n<p>First, understand the end users\u2019 <em>Goals<\/em>, and the <em>Controls<\/em> needed to complete them;<\/p>\n<p>then define the <em>Contexts<\/em> needed to inform and direct the use of controls;<\/p>\n<p>add <em>Efficiencies<\/em>, protecting the user\u2019s time and attention.<\/p>\n<p>Only then should you settle on a <em>Presentation<\/em>, containing and supporting all the work done previously, directing the eye and keeping the mind clear.<\/p>\n<h3>Goals and Controls<\/h3>\n<p>Most cybersecurity products satisfy the goals set for them, though these are rarely informed by the end-users\u2019 goals except in broad strokes. The classic cybersecurity products promise to deliver on abstract goals like \u201cgreater protection,\u201d stopping issues before they become problems, or \u201cgreater visibility,\u201d by no longer allowing some issues to fly under the radar. These sound like things anyone should want. But what if someone spent all their time chasing alerts when a better goal might produce better results?<\/p>\n<p>What do you do when you have too many alerts? I know a large, international bank which signed a very dear contract to fill a warehouse in the Netherlands with around 100 young technical people, rotating in and out on 8-hour shifts, keen eyes focused on each new threat. It became a problem when higher-level management realised the contractors were billing by the number of threats, a number contractors could control by tweaking the policy for evaluating network traffic. The goal of chasing threats suddenly began to feel like a dead end, in addition to being dead expensive.<\/p>\n<p>After getting to know our own customers, I proposed we flip our flagship product\u2019s dashboard in favor of a compliance-based approach: namely, are you running the most recent version of your security software? That\u2019s how some of our most successful customers got ahead of the torrent of alerts without cheating: first, make sure that all your endpoints\u2014the devices on your network, from fat servers to wafer-thin laptops\u2014run the most current threat software with the most recent threat models. For various reasons, a vendor\u2019s updating processes can get gummed up for months if no one\u2019s paying attention, which can result in machines being exposed to and exploited by threats to which their peers were essentially invulnerable. By prioritizing software compliance, threats that you do see should be real, actionable threats, and there should be vastly fewer of them.<\/p>\n<p>Very quickly\u2014by our definition; around half a year\u2014we reimagined the user experience of our flagship product for compliance alongside threat-monitoring, while providing automatic enforcement tools for both. As our other security offerings integrated into our platform\u2019s new model, we shifted from many tens of different contexts across four or more different logins, each with their own UX, to one login on one console and two contexts: a summary view and a drill-down into details. The detail view would encourage admins to push deployments of the newest security packages, bringing the host into compliance. The most important function required no effort from the user at all: automatic isolation of endpoints that may have been exploited, preventing the threat\u2019s lateral spread to other internal hosts.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=1920&amp;name=old-poroduct-reviseed.jpg\" alt=\"old-poroduct-reviseed\" width=\"1920\" loading=\"lazy\" srcset=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=960&amp;name=old-poroduct-reviseed.jpg 960w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=1920&amp;name=old-poroduct-reviseed.jpg 1920w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=2880&amp;name=old-poroduct-reviseed.jpg 2880w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=3840&amp;name=old-poroduct-reviseed.jpg 3840w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=4800&amp;name=old-poroduct-reviseed.jpg 4800w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=5760&amp;name=old-poroduct-reviseed.jpg 5760w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"><figcaption><em><strong>Old product view<\/strong>: static charts, endless contexts.<\/em><\/figcaption><\/figure>\n<figure><img decoding=\"async\" src=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=1804&amp;name=image003.png\" alt=\"image003\" width=\"1804\" loading=\"lazy\" srcset=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=902&amp;name=image003.png 902w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=1804&amp;name=image003.png 1804w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=2706&amp;name=image003.png 2706w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=3608&amp;name=image003.png 3608w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=4510&amp;name=image003.png 4510w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/image003.png?width=5412&amp;name=image003.png 5412w\" sizes=\"auto, (max-width: 1804px) 100vw, 1804px\"><br \/><figcaption><em><strong>New product view<\/strong>: Threat Monitoring and Software Compliance come together to speed problem solving in a shared context.<\/em><\/figcaption><\/figure>\n<p>The result: many fewer threat events, and more time and attention to focus on the ones that weren\u2019t automatically blocked. The best part: our new UX solution required little in the way of new engineering at any kind of scale. These grand new capabilities were things our system could already do if you knew how to pull the right levers. We were curious and humble enough to learn from our most successful customers and roll their strategies out to everyone else.<\/p>\n<p>Ultimately, an experience must meet its intended goals. But you must choose the proper goals. We were lucky, in this case. The cost to have your product\u2019s UX fulfill its purpose by way of reimagined goals will generally add up to a sum greater than any sane executive would pay. We had a richly flexible platform on which nimble engineers could build, as well as unusually risk-tolerant executives&nbsp;whose top-down support made all the difference.<\/p>\n<h3>Context<\/h3>\n<p>Context, in its most basic form\u2014the \u201cwhat\u201d and \u201cwhy\u201d of an issue\u2014is crucial to a human making the call between \u201cignore this\u201d and \u201cjump on this now.\u201d<\/p>\n<p>A top-level dashboard for one popular product had a pie chart showing the total number of events for the day, by criticality. Most of it was green, with a hefty wedge of yellow for unclassified security events and a sliver of red. Because the red changed so little from one day to another, one customer assumed all was well. They overlooked a huge spike in malicious (red) events because the outbreak also caused an enormous spike in innocuous (green) events, keeping ratios between the two the same.<\/p>\n<p>The best kind of context takes something moderately functional and makes it fascinating. I took hundreds of screens from our most popular product\u2019s policy editor and origami\u2019ed it into One Screen to Rule Them All, in terms of that one specific class of policy. When I showed the design proposal to customers, they nodded quietly and asked how soon it would ship.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=1928&amp;name=UX%20Model%20old-new%20comparison.png\" alt=\"UX Model old-new comparison\" width=\"1928\" loading=\"lazy\" srcset=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=964&amp;name=UX%20Model%20old-new%20comparison.png 964w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=1928&amp;name=UX%20Model%20old-new%20comparison.png 1928w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=2892&amp;name=UX%20Model%20old-new%20comparison.png 2892w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=3856&amp;name=UX%20Model%20old-new%20comparison.png 3856w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=4820&amp;name=UX%20Model%20old-new%20comparison.png 4820w, https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/UX%20Model%20old-new%20comparison.png?width=5784&amp;name=UX%20Model%20old-new%20comparison.png 5784w\" sizes=\"auto, (max-width: 1928px) 100vw, 1928px\"><\/p>\n<h3>Efficiency<\/h3>\n<p>There are many ways to make workflows more efficient, though I tend to focus on the larger labels of Assistance and Protection.<\/p>\n<p>Assist the user in understanding why something has happened, then boost their overall efficiency by letting them close a loop in a workflow without leaving the current context.<\/p>\n<p>If some annoying false-positive events are spamming your security console\u2019s dashboard, you\u2019d want to dial them down to make it more likely you\u2019ll more quickly see events of real interest. But when you have to fumble through a series of menus to get to the setting that needs editing, you may no longer be confident about what exactly needs to change in order to silence those errant alerts. It would be super efficient to let people call up the view for the spammy event\u2019s settings without leaving the dashboard. Then your eye simply needs to dart between two panels side-by-side in order to confidently make the right change.<\/p>\n<p>Don\u2019t prioritise screen tidiness by hiding \u201cgarbage\u201d or \u201cnot human-readable\u201d fields if customers depend on them. Let the drive for efficiency prioritise the work to present relevant information and controls in the same larger context.<\/p>\n<p>It should be an easy sell to protect users by respecting their time\u2014and one of the most impactful ways to do that is by respecting their cognition. Protection from unnecessary context switching is one of the most straightforward and valuable uplifts you can provide.<\/p>\n<h3>Presentation<\/h3>\n<p>The presentation of an experience is usually considered to cover styles, branding, and other aesthetic concerns. All too often, the product owners already have some idea of what information they\u2019d like to present from the start of the project, and simply want a designer to take some examples of the data they already intend to present, rendering it out in a way that can be implemented quickly.<\/p>\n<p>While those are important drivers, they\u2019re often best served by establishing a clear visual hierarchy. The viewer\u2019s eye should be drawn from one area or element on the screen to another in order of importance. Importance to what? Early in the process, it\u2019s hard to know for sure. That\u2019s why holding off on major presentation decisions until now can pay off.<\/p>\n<p>For example: Consider carefully how you sprinkle red and other colors or tones around your screens. It should make users more efficient in grasping the message delivered in your presentation design.<\/p>\n<p>Every view on screen or on paper comes with a visual hierarchy, whether it was intentionally designed to have one or not. Users will take something from it, even it\u2019s not what was intended.<\/p>\n<p>Inverting the usual direction in which these products are designed is the only way to break out of the negative feedback loop in which many product industries unwittingly find themselves. Driving the process from this perspective puts the focus on what truly makes users successful, increasing the odds of an organization\u2019s success.<\/p>\n<p>If we do not, cybersecurity products will continue to be more than simply expensive. They are likely to cost all of us dearly, in many different ways.<\/p>\n<p><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-2adeef32-5f13-4584-ba6a-d3d423329c26\"><span class=\"hs-cta-node hs-cta-2adeef32-5f13-4584-ba6a-d3d423329c26\" id=\"hs-cta-2adeef32-5f13-4584-ba6a-d3d423329c26\"><!--[if lte IE 8]>\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2252258\/2adeef32-5f13-4584-ba6a-d3d423329c26\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-2adeef32-5f13-4584-ba6a-d3d423329c26\" height=\"1001\" width=\"2001\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2252258\/2adeef32-5f13-4584-ba6a-d3d423329c26.png\" alt=\"New call-to-action\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33127\/WTF-Is-Our-Most-Critical-Cybersecurity-Resource-And-How-Can-We-Preserve-It.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45354,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5089],"class_list":["post-45353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinescience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-18T19:19:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=1920&amp;name=old-poroduct-reviseed.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It?\",\"datePublished\":\"2022-02-18T19:19:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/\"},\"wordCount\":3455,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg\",\"keywords\":[\"headline,science\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/\",\"name\":\"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg\",\"datePublished\":\"2022-02-18T19:19:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,science\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinescience\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/","og_locale":"en_US","og_type":"article","og_title":"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-18T19:19:21+00:00","og_image":[{"url":"https:\/\/blog.container-solutions.com\/hs-fs\/hubfs\/WTF%20blog%20diagrams\/old-poroduct-reviseed.jpg?width=1920&amp;name=old-poroduct-reviseed.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It?","datePublished":"2022-02-18T19:19:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/"},"wordCount":3455,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg","keywords":["headline,science"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/","url":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/","name":"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg","datePublished":"2022-02-18T19:19:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wtf-is-our-most-critical-cybersecurity-resource-and-how-can-we-preserve-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,science","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinescience\/"},{"@type":"ListItem","position":3,"name":"WTF Is Our Most Critical Cybersecurity Resource? And How Can We Preserve It?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45353"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45354"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}