• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

This Explains Why America’s Cybersecurity Efforts Continue to Fail

By
George Kurtz
George Kurtz
Down Arrow Button Icon
By
George Kurtz
George Kurtz
Down Arrow Button Icon
January 19, 2016, 11:30 AM ET
Photograph via Getty Images

Experts have been ringing alarm bells for years and issuing explicit warnings about the long-lasting damage that cyber breaches can inflict on business assets, customer trust, and brand reputation. When the coverage of the Sony (SNE) hack erupted at the end of 2014, it became clear that no business, no matter which industry or how sophisticated, is safe from cyber intrusions. And, just before we rang in 2016, adversaries reminded us of the kinetic effects of cyber attacks when we saw the hack of the Ukrainian power grid causing a blackout for thousands of households.

It’s not an easy task for any organization to defend against the wide range of attackers going after intellectual property, credit card information, customer information or other business assets. There’s an inherent asymmetry in these attacks: the defender must be right 100%of the time, while the adversary only needs to get lucky once. Additionally, this inherent imbalance of power can become an expensive arms race where each incremental dollar spent doesn’t necessarily equate to another unit of security – which may still leave an organization exposed.

See also: Inside the Hack of the Century

Arguably, the Sony hack created an inflection point for board-level leadership at many companies worldwide. And the string of high-profile breaches that followed the disruptive attack, including the first that affected electricity output to thousands, triggered a new refrain: Cybersecurity is a shared responsibility and cyber risk-management has to be addressed from all corners of the organization. Looking at how the conversation about cybersecurity has changed in the past year, here are some key security lessons learned that the 2015 hacks brought to light:

Every business is a target
Whether a Fortune 500 company, a mom-and-pop shop or even a utility company, all businesses today are vulnerable and are proactively sought after as attack targets – whether by a nation-state group, a criminal network, or an independent hacker. From social security numbers to intellectual property – every brand today is trusted with information that translates to monetary value which can be sold on the Black Market or used for strategic espionage and data collection.

Visibility into threats is key
In today’s vast threat landscape, no organization can prevent 100
% of breach attempts. Adversaries are sophisticated, determined and often times well-funded. This is why businesses across every industry need to shift their focus towards detecting threats and gaining insight into what risks they are exposed to. In many cases, it still takes months to detect adversary activity, and often by that time, the attackers have siphoned trade secrets and exposed the organization to serious liability or loss of IP. The ability to detect and prevent intrusions – whether malware or malware-free – lessens business risk.

Credential theft is devastating
The most common goal of attackers upon initial entry into the network is to secure domain and enterprise credentials to maximize chances of staying unnoticed. In many of the breaches that made the headlines in 2015, the adversaries succeeded in stealing administrative credentials and moving laterally across the environment. To that end, leveraging technologies that look at behavioral based indicators of attack and track the effects of what the adversary is trying to accomplish are more effective in identifying attacks in progress. Moreover, it is fallacy to believe you are safe if you stop every piece of malware, this thinking doesn’t hold true today as over 60
% of successful breaches are malware-free intrusions.

Protect every endpoint
When adversaries pursue economic espionage or network destruction they look at endpoints as the starting point for assaults. Although endpoints are often the first line of defense against adversaries, in most enterprises, very few people are behind the VPN 24/7. To that end, organizations need thin, easily scalable solutions that protect all endpoints – servers, PCs, workstations – without hampering productivity or slowing down network processes. Adapting corporate risk mitigation strategies to incorporate endpoint protection enhances attack readiness.

Treating cybersecurity as an add-on to IT operations is just not working for corporate America. Without a radical change to make cybersecurity a part of the fabric of the organization, from the server room to the Board of Directors, the balance of power will continue to favor the adversary.

With unprecedented attacks from Sony to the recent hack of the Ukrainian power grid, it’s become clear that each and every organization must implement a top-to-bottom risk mitigation plan which includes investing in breach readiness, and response capabilities. Note the word “mitigate” not “eliminate,” as 100% elimination of a breach risk would be too costly and not possible. Risk mitigation should include evaluating cyber-insurance options to insure for some of the risk that cannot be eliminated – organizations should prevent what it can, but be ready to deal with an intrusion. The key is to rapidly assess any intrusion that has managed to sneak past your defense and contain that intrusion immediately. Containing an intrusion as early as possible will ultimately prevent the “mega” breach we have become desensitized to.

George Kurtz is the CEO and co-founder of cybersecurity technology firm CrowdStrike.

About the Author
By George Kurtz
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Commentary

welti
CommentaryIran
Switzerland’s former ambassador to Iran: here’s how to end this war — and why Pakistan isn’t enough
By Philippe WeltiApril 17, 2026
5 hours ago
Anita Beveridge-Raffo is Head of Retail and Consumer Goods at Palantir Technologies
CommentaryAI agents
Palantir exec: the biggest mistake retailers are making with AI? Trying to do it all with one agent
By Anita Beveridge-RaffoApril 16, 2026
23 hours ago
wyle
CommentaryHealth
‘The Pitt’ reveals why healthcare desperately needs a new front door
By Jeremy MorganApril 16, 2026
24 hours ago
health
CommentaryHealth Care Service
Two physicians on ending the waiting-room era: bring care home
By Benjamin Kornitzer and Bill FristApril 16, 2026
1 day ago
venezuela
Commentaryhappiness
The world’s most — and least — miserable economies in 2025, ranked
By Steve H. HankeApril 16, 2026
1 day ago
fauber
Commentarytrust
Moody’s CEO: AI has a trust problem – better models won’t fix it
By Rob FauberApril 16, 2026
1 day ago

Most Popular

Jeff Bezos pledged $10 billion for climate change. With the 2030 clock ticking, his wife, Lauren Sánchez Bezos, is leading the charge to spend it
Environment
Jeff Bezos pledged $10 billion for climate change. With the 2030 clock ticking, his wife, Lauren Sánchez Bezos, is leading the charge to spend it
By Sydney LakeApril 15, 2026
2 days ago
A world going broke: IMF says America's $39 trillion national debt is actually a global problem—and AI may be the only rescue
Economy
A world going broke: IMF says America's $39 trillion national debt is actually a global problem—and AI may be the only rescue
By Nick LichtenbergApril 16, 2026
17 hours ago
Germany already told its workers to ditch four-day weeks and work-life balance. Now the government wants to cut their pay for calling in sick, too
Success
Germany already told its workers to ditch four-day weeks and work-life balance. Now the government wants to cut their pay for calling in sick, too
By Orianna Rosa RoyleApril 16, 2026
1 day ago
MacKenzie Scott is bypassing the Ivy League and rewriting the $79 billion higher ed playbook by giving to HBCUs and community colleges
Politics
MacKenzie Scott is bypassing the Ivy League and rewriting the $79 billion higher ed playbook by giving to HBCUs and community colleges
By Sydney LakeApril 16, 2026
21 hours ago
Current price of oil as of April 16, 2026
Personal Finance
Current price of oil as of April 16, 2026
By Joseph HostetlerApril 16, 2026
1 day ago
Billionaire philanthropist MacKenzie Scott has donated again—a week after gifting millions to a college, she's just given $70 million to Meals on Wheels America
Success
Billionaire philanthropist MacKenzie Scott has donated again—a week after gifting millions to a college, she's just given $70 million to Meals on Wheels America
By Emma BurleighApril 13, 2026
4 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.