{"id":6636,"date":"2023-03-06T08:29:43","date_gmt":"2023-03-06T08:29:43","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/target\/complexity-volume-of-cyber-attacks-lead-to-burnout-in-security-teams\/"},"modified":"2023-03-28T06:49:22","modified_gmt":"2023-03-28T06:49:22","slug":"security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/","title":{"rendered":"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats."},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p>The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to <a href=\"https:\/\/www.helpnetsecurity.com\/2022\/01\/31\/cybersecurity-teams-retention-issues\/\">widespread burnout<\/a> and potential regulatory risk, according to Magnet Forensics.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/img2.helpnetsecurity.com\/posts2023\/magnet_forensics_17022023.jpg\" alt=\"DFIR teams\" \/><\/p>\n<p>\u201cDigital forensics and incident response teams have proven to be indispensable to combat cybercriminals but the complexity and volume of attacks and the dearth of talent available to address them is leading to unprecedented burnout,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/adambelsher\/\">Adam Belsher<\/a>, CEO of Magnet Forensics.<\/p>\n<p>The annual Magnet Forensics survey polled 492 digital forensics and incident response (DFIR) decision-makers and practitioners predominately located in North America, Europe, the Middle East and Africa. Its respondents described the current cybercrime landscape as evolving beyond ransomware and taking a toll on their investigation ability.<\/p>\n<h3>Growing incident waves overwhelm DFIR teams<\/h3>\n<ul>\n<li>40% of respondents described the evolution of cyberattack techniques as a \u201clarge\u201d or \u201cextreme\u201d problem impacting their investigations. This represents a 50% increase from the 2022 State of Enterprise DFIR report.<\/li>\n<li>Business email compromise is on the rise and is now occurring more frequently than ransomware, the most common security threat in last year\u2019s report. The highest number of respondents \u2014 14% \u2014 said they encounter it \u201cvery frequently.\u201d<\/li>\n<li>Business email compromise attacks are the most likely to require third-party resources to assist with the investigation, according to 50% of respondents.<\/li>\n<li>It\u2019s taking security teams too long to get to the root cause of these evolving attacks. 43% said it takes them between one week and more than a month. About 1 in 3 respondents said that identifying the root cause requires either a \u201ccomplete overhaul\u201d or \u201cmajor improvements.\u201dWith cybercriminals intensifying their efforts, DFIR teams now find themselves investigating waves of incidents that are growing in volume and complexity.According to 45% of respondents, the surge in investigations and the data associated to them is either a \u201clarge\u201d or \u201cextreme\u201d problem for their organizations. Unable to handle this data alone, nearly two-thirds look to third parties for help.\n<p>A global talent shortage, one that\u2019s left more than 755,000 unfilled cyber jobs in the U.S. alone, isn\u2019t helping matters, according to the respondents. Nearly 1 in 3 say that recruiting and hiring new DFIR professionals for a security team is a challenge. Each of these factors is contributing to their burnout and leading them to seek out alternate solutions like automation.<\/p>\n<h3>Alert and investigation fatigue is likely playing a role in burnout<\/h3>\n<ul>\n<li>54% of the respondents said they were feeling burned out in their jobs.<\/li>\n<li>Alert and investigation fatigue is likely playing a role in burnout as 64% of respondents said it is a \u201creal issue.\u201d<\/li>\n<li>Today\u2019s investigative workflows are being slowed down by a reliance on repetitive tasks and tools that aren\u2019t interoperable. The same percentage of respondents \u2014 37% \u2014 described both as either a \u201clarge\u201d or \u201cextreme\u201d problem.<\/li>\n<li>Their workload may be contributing to exposing their organizations to regulatory risk. 46% said they just don\u2019t have the time to understand new cybersecurity regulations.<\/li>\n<li>The respondents see automation as the solution. 50% said automation would be \u201cextremely valuable\u201d or \u201chighly valuable\u201d for several DFIR tasks, including the remote acquisition of target endpoints and the processing of digital evidence.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6946,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,4,51],"tags":[35,52],"class_list":{"0":"post-6636","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-attack","8":"category-cyber-security","9":"category-vulnerabilities","10":"tag-cyber-attack","11":"tag-vulnerabilities"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats. - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats. - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-06T08:29:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T06:49:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/diverse-computer-hacking-shoot.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats.\",\"datePublished\":\"2023-03-06T08:29:43+00:00\",\"dateModified\":\"2023-03-28T06:49:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/\"},\"wordCount\":684,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/diverse-computer-hacking-shoot.jpg\",\"keywords\":[\"Cyber Attack\",\"Vulnerabilities\"],\"articleSection\":[\"Cyber Attack\",\"Cyber Security\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/\",\"name\":\"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats. - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/diverse-computer-hacking-shoot.jpg\",\"datePublished\":\"2023-03-06T08:29:43+00:00\",\"dateModified\":\"2023-03-28T06:49:22+00:00\",\"description\":\"The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/diverse-computer-hacking-shoot.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/diverse-computer-hacking-shoot.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats. - Sajin Shivdas | Cybersecurity","description":"The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats. - Sajin Shivdas | Cybersecurity","og_description":"The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-03-06T08:29:43+00:00","article_modified_time":"2023-03-28T06:49:22+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/diverse-computer-hacking-shoot.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats.","datePublished":"2023-03-06T08:29:43+00:00","dateModified":"2023-03-28T06:49:22+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/"},"wordCount":684,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/diverse-computer-hacking-shoot.jpg","keywords":["Cyber Attack","Vulnerabilities"],"articleSection":["Cyber Attack","Cyber Security","Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/","name":"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats. - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/diverse-computer-hacking-shoot.jpg","datePublished":"2023-03-06T08:29:43+00:00","dateModified":"2023-03-28T06:49:22+00:00","description":"The rapid evolution of cybercrime is weighing on security teams substantially more than it did last year, leading to widespread burnout and potential","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/diverse-computer-hacking-shoot.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/diverse-computer-hacking-shoot.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/security-teams-are-exhausted-due-to-the-complexity-and-volume-of-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Security Teams are Exhausted due to the Complexity and Volume of Cyber Threats."}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6636"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6946"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}