ADVERTISEMENT
TechEconomy
Tuesday, May 13, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » Lack of expertise tops reasons 57% of businesses surveyed across META outsource IT security

Lack of expertise tops reasons 57% of businesses surveyed across META outsource IT security

Yinka Okeowo by Yinka Okeowo
January 15, 2022
in Security
0

RelatedPosts

CyberDome and Cato Networks

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

May 12, 2025

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025

More than half (57%) of small and medium-sized businesses (SMBs) and enterprises across the META region listed the need for special expertise among their  top reasons for engaging third-party security specialists in 2021, according to the Kaspersky annual IT Security Economics report.

Other commonly listed top reasons among both groups include meeting compliance requirements (SMB: 57%; enterprise: 56%) and efficiency in delivering cybersecurity solutions (SMB: 43%; enterprise: 66%).

To help IT security workers reach that highly sought-after professional level, Kaspersky has expanded its online training portfolio with the Advanced Malware Analysis Techniques course for established reverse engineers, incident responders, and digital forensic specialists.

In 2020, businesses were forced to accelerate their digital transformation by months, or even years, resulting in the rapid increase of complex IT infrastructure and related security risks. In combination with the shortage of cybersecurity specialists and a lack of capacity to develop talent internally, this situation has compelled companies to look for external support.

Kaspersky’s global research, conducted among IT business security decision-makers, shows that companies are turning to outsourcing of certain functions to gain expert help.

In 2021, specialist expertise has surpassed even financial effectiveness as the main reason to bring in third-party services for business globally and locally across the META region. Additionally, last year, enterprises mainly outsourced IT security because of the added efficiency they provided in delivering security solutions (66%), while SMBs were guided by shortages of expert skills inside the organisation (80%) and financial considerations (60%).

IT Security outsourcing across META (1)
United BANK
Global findings: Reasons for outsourcing IT security functions to MSPs/MSSPs (Source: Kaspersky)

Improving defenses (40%) and the level of specialist security expertise (39%) are expected to dominate IT security budget expenditure for all sizes of business – and were listed as the main drivers for increasing business spending on cybersecurity.

All of this means that highly qualified security experts are more in demand today than ever. Those who want to enhance their career must seize the moment to acquire new, rare skills.

To help professionals from all over the world take their skills to a new level, Kaspersky has expanded its training portfolio with the new Advanced Malware Analysis Techniques course.

United BANK

The focus of the course is advanced static analysis. That is because this is the most reliable way to determine the functionality of the code and find actionable artifacts for cybersecurity incidents involving previously unseen malicious code. This allows organisations affected by APTs to define adequate damage assessment and incident response.

The course also heavily features exclusive Kaspersky know-how on decryption automation, decoding and other processing of the samples, which helps not only optimise routine tasks, but preserve a researcher’s work in code.

The training was developed by Igor Kuznetsov, Chief Security Researcher and member of Kaspersky’s revered Global Research and Analysis Team.

Igor cherry-picked exercises from his own work on cases like Lazarus, MiniDuke and Carbanak, to cover the most important aspects of static analysis in IDA Pro while also demonstrating unique cornerstone cases that require special treatment.

“During my 20-year career at Kaspersky, I have had a chance to work on many interesting and notorious APT campaigns. The Advanced Malware Analysis Techniques course has assembled this expertise to transfer it to the next generation of IT security professionals. We hope that our experience and the tools that we share will help level up the experience of working with cybersecurity incidents – such as analysing complicated malware or doing onsite incident response and triaging samples correctly,” comments Igor Kuznetsov, Chief Security Researcher at Kaspersky.

IT Security outsourcing across META (2)
Source: Kaspersky

The course contains 60 video lessons and 100 hours of virtual lab time for hands-on learning. Participants will have 6-months of access to complete the training at a convenient pace.

Loading

Author

  • Yinka Okeowo
    Yinka Okeowo

    View all posts
0Shares

Tags: Advanced MalwareIgor KuznetsovIT SecurityIT Security expertIT Security outsourcing
Previous Post

AFCON 2021 Live on StarTimes: Nigerians rekindle confidence in Super Eagles

Next Post

Importance of Omnichannel Marketing for Your Business

Yinka Okeowo

Yinka Okeowo

Related Posts

CyberDome and Cato Networks
Security

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

by Joan Aimuengheuwa
May 12, 2025
0

CyberDome, West Africa’s leading Managed Security Services Provider (MSSP), has announced collaboration with Cato Networks, the SASE leader, to deliver...

Read more
Sophos warning about Chinese Cars -

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025
FG Launches Data Privacy Academy

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025
Future of multi-cloud by Samson Aligba -

Securing the Future of AI Integration: Why an Enterprise-Grade Model Context Protocol Framework is Crucial

May 5, 2025
AI-Powered Cybercrime

Check Point: Exposing the Rise of AI-Powered Cybercrime, Defenses

May 5, 2025
World Passwords Day

Is it Time to Goodbye to Passwords?

May 2, 2025
Next Post

Importance of Omnichannel Marketing for Your Business

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.