• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

To fix the cybersecurity talent shortage, we need smarter product design

By
Abhishek Agrawal
Abhishek Agrawal
Down Arrow Button Icon
By
Abhishek Agrawal
Abhishek Agrawal
Down Arrow Button Icon
March 16, 2021, 10:30 AM ET
"Tapping familiar security design concepts, patterns, and even terminology can prove crucial to building simple, bulletproof products," writes Abhishek Agrawal.
"Tapping familiar security design concepts, patterns, and even terminology can prove crucial to building simple, bulletproof products," writes Abhishek Agrawal.Getty Images

“We need more people” is a constant refrain in cybersecurity (just as it is in other global sectors like healthcare and transportation). But the supply-side characterization misses the mark on the industry’s primary challenge—figuring out how to design security products that work with minimal human participation.

In order to understand the big picture, it’s important to ask: Why do security teams need so many people in the first place? One important reason resides squarely on the demand side. Most cybersecurity products rely heavily on people to make them work and iron out any misfires or false positives. Most need constant babysitting after being deployed into a client’s infrastructure. 

There’s also an inherent concern across security disciplines about the resourcefulness and evolving skill sets of hackers like those behind Sony, the 2016 election hacks, SolarWinds, the recent Microsoft Exchange Hafnium hack, and others. Big hacks like these lead many security pros to believe that they perpetually require an all-hands-on-deck approach, both from an enterprise security practitioner and product standpoint.

This multifaceted dynamic is actually as much (if not more) of a product design issue as a human capital one. So, why are we still treating it as solely a talent challenge? In order to right the ship, we need to unify around security products that are intentional about keeping overhead low. We should keep these three design principles in mind:

#1: Bring the end-user into the fold

Arming users with simple workflows can decentralize a solution’s operational load, while reinforcing shared accountability between administrators and end-users. And taking that approach can be more effective for both parties—especially if end-users have more business context than a centralized security team does. 

In practice, modern multi-factor authentication (MFA) products—employed by companies to add an additional verification step that ensures people logging into platforms actually belong there—are one of the best examples of striking this balance. For an end-user, rejecting an MFA challenge is a simple action that allows people to participate in their own security. Companies that offer these products, including Duo, Okta, and Yubico, do a great job of packaging MFA workflows into an end-user experience that is easy on users and security teams—while spreading the accountability among them.

This model can, and should, be applied across suites of security products.

#2: Alerts should be more meaningful, not more frequent

Getting security alerting right is hard, but that doesn’t mean products can abdicate responsibility for delivering meaningful and/or context-rich information to end-users. For many of us in the business, it can seem like responding to alerts takes up a significant portion of our days and drains our overall productivity (and life force). A big reason why this persists globally: the importance of a given security event is highly subjective and depends on several factors specific to an organization and/or end-user. Further, unlike notifications in other products, the cost of being wrong or under-alerting even once can prove fatal. 

The cybersecurity industry’s legacy obsession with not missing a single thing tragically creates massive inefficiencies and disrupts workflows. But that doesn’t have to be our reality for much longer. In fact, thoughtfully designed, low overhead security products can combat this problem with a one-two punch today. 

First, they need to be designed with thoughtful out-of-the-box settings that prioritize delivering a high ratio of useful alerts, versus trying to catch every single event. Second, they need to be designed to allow alert thresholds to match an organization’s risk appetite and security talent bandwidth. For a contemporary example, look at Thinkst Canary’s tool, which constantly monitors for attackers autonomously and issues a single, context-packed alert when a breach is detected.

#3: Recycle your best design ideas

Today’s best security products minimize the amount of information that needs to be configured or defined, opting for integrations instead. Even when integration with other tools or workflows is impossible, borrowing existing concepts, data models, or patterns can reduce a product’s onr-amp time and operational overhead. It can also lead to the development of products that are faster to set up, automatically adapt to changes in an organization, and help ensure that everyone with access uses the right data to make business decisions—while resisting becoming another operational burden.

For example, Fleetsmith, the Mac device-management product recently acquired by Apple, treats a company’s Google or O365 account as the source of truth for their list of users—versus deciding to build an employee directory from scratch. It’s a simple choice that saves Fleetsmith’s administrators a lot of time because it eliminates the need to manually update and sync two (seemingly unrelated) systems. Across the board, tapping familiar security design concepts, patterns, and even terminology can prove crucial to building simple, bulletproof products. 

Don’t throw bodies at the problem

Solving cybersecurity’s talent supply shortage can’t happen overnight. Frankly, it can’t happen at all until our industry collectively shifts how we think about the way products are designed, built, and innovated. On the demand side, attempting to address security issues with tools that require constant babysitting or scores of people to keep them running will never scale.

In practice, we need to inspire product builders and buyers to become obsessed with minimizing overhead as an explicit design objective, not an afterthought. The companies I’ve singled out above deliver low-overhead, high-quality products designed with security and productivity at their core today. But the entire industry needs to embrace these design principles in order to make meaningful progress in closing talent gaps and delivering superior products to the market tomorrow. 

Abhishek Agrawal is the co-founder and CTO at Material Security.

About the Author
By Abhishek Agrawal
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Commentary

hegseth
CommentaryMilitary
America shot its arsenal empty in 2 wars. Now it needs Beijing’s permission to reload
By Steve H. Hanke and Jeffrey WengApril 30, 2026
11 hours ago
Duncan Tait, CEO of Inchcape
Europecar manufacturing
“Competition is good for the industry”. Inchcape CEO’s case for optimism in automotive’s next chapter
By Duncan TaitApril 30, 2026
14 hours ago
agentic
CommentaryAI agents
Why your data infrastructure — not your AI model — will determine whether Agentic AI scales
By Jeffrey Sonnenfeld, Stephen Henriques, Catherine Dai and Zander JeinthanuttkanontApril 30, 2026
17 hours ago
hoskins
Commentaryoffices
Gensler Co-Chair: Hot-desking was supposed to save money. It may be costing you your culture
By Diane HoskinsApril 30, 2026
19 hours ago
tillis
CommentaryCongress
Thom Tillis: Free markets built American prosperity. Government intervention puts it at risk
By Thom Tillis and John StanfordApril 30, 2026
20 hours ago
iran
CommentaryIran
The Strait of Hormuz is a data problem, not just a military one
By Erik Bethel and Ami DanielApril 30, 2026
21 hours ago

Most Popular

Apple cofounder Ronald Wayne—whose stake would be worth up to $400 billion had he not sold it in 1976—says that at 91, he has no regrets
Success
Apple cofounder Ronald Wayne—whose stake would be worth up to $400 billion had he not sold it in 1976—says that at 91, he has no regrets
By Preston ForeApril 27, 2026
4 days ago
Google Cloud revenue is now 18% of Alphabet's business. Is this the beginning of the end of Google's search identity?
Big Tech
Google Cloud revenue is now 18% of Alphabet's business. Is this the beginning of the end of Google's search identity?
By Alexei OreskovicApril 29, 2026
1 day ago
China dominates the world's lithium supply. The U.S. just found 328 years' worth in its own backyard
North America
China dominates the world's lithium supply. The U.S. just found 328 years' worth in its own backyard
By Jake AngeloApril 30, 2026
11 hours ago
‘The cost of compute is far beyond the costs of the employees’: Nvidia executive says right now AI is more expensive than paying human workers
AI
‘The cost of compute is far beyond the costs of the employees’: Nvidia executive says right now AI is more expensive than paying human workers
By Sasha RogelbergApril 28, 2026
3 days ago
With no end in sight, Trump considers new options in Iran war—including the ‘Dark Eagle’ hypersonic missile
Big Tech
With no end in sight, Trump considers new options in Iran war—including the ‘Dark Eagle’ hypersonic missile
By Jim EdwardsApril 30, 2026
19 hours ago
No, tariffs are not strengthening the economy
Commentary
No, tariffs are not strengthening the economy
By Alex DuranteApril 29, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.