{"id":2217,"date":"2026-01-21T15:57:38","date_gmt":"2026-01-21T14:57:38","guid":{"rendered":"https:\/\/showcase-preprod.neverhack.dev\/b\/?p=2217"},"modified":"2026-02-13T10:41:46","modified_gmt":"2026-02-13T09:41:46","slug":"the-only-sensible-approach-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/","title":{"rendered":"The only sensible approach to cybersecurity"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Evolution of cybersecurity<\/h3>\n\n\n\n<p>Since I started working in that field in 1999, cybersecurity has gone from being very low on the CIO agenda to consistently making it to the top positions on the CEO list of dreaded risks.\u00a0<br><br>While this has proven an arduous journey paved with lots of corporate casualties along the way, it is quite a satisfaction, particularly for those who have made it their occupational raison d\u2019\u00eatre to warn about the dangers of overlooking its necessity.\u00a0But if it is now clearly out of infancy, I believe cybersecurity is somewhat still in its teens\u2026<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Challenges for the defenders<\/h3>\n\n\n\n<p>On the defender side, just to name a few hiccups, OT is still largely not properly secured, the cybersecurity skill and education gap is far from being bridged, and we are yet to see the power of AI fully unleashed.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Challenges for the attackers<\/h3>\n\n\n\n<p>On the attacker side, <a href=\"https:\/\/neverhack.com\/en\/offers\/incident-response\">phishing schemes<\/a> that have become increasingly sophisticated, the opportunistic rise of home-working and mobility still not properly kept in check, and the greater and greater specialization of criminal groups who provide attack-as-a-service, all this makes me think that we haven\u2019t yet seen what a massive, full-scale attack can do on a globalized economy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The dilemmas of decision-makers<\/h3>\n\n\n\n<p>Investing for cybersecurity is a tough call for decision-makers today as they are torn between the pleas of their own technical specialists, the apathy of businesses who resent controls that they perceive as business hinderance, and the pressing voices of external experts who advocate in their best interest.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The importance of a holistic approach<\/h3>\n\n\n\n<p>Experience has convinced me that it is a mistake to oppose the various pillars of cybersecurity:&nbsp;without sound <a href=\"https:\/\/neverhack.com\/en\/offers\/soc-mssp\">detection and response capabilities<\/a>, what good is an operating governance framework?<\/p>\n\n\n\n<p>Without the results of good third-party risk management, what base is there to make a sound investment decision about the deployment of, say, a CIAM solution?&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Strategic vision<\/h3>\n\n\n<div class=\"quote-block acf-block\">\n            <div class=\"quote-container w-full flex flex-col gap-2 px-8 pt-6 pb-8 xl:px-12 xl:pt-8 xl:pb-12 my-12 rounded-2xl bg-white\/4\">\n            <svg class=\"h-12 w-12 xl:h-14 xl:w-14 fill-white\/12\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\">\n    <path d=\"M4.58341 17.3211C3.55316 16.2274 3 15 3 13.0103C3 9.51086 5.45651 6.37366 9.03059 4.82318L9.92328 6.20079C6.58804 8.00539 5.93618 10.346 5.67564 11.822C6.21263 11.5443 6.91558 11.4466 7.60471 11.5105C9.40908 11.6778 10.8312 13.159 10.8312 15C10.8312 16.933 9.26416 18.5 7.33116 18.5C6.2581 18.5 5.23196 18.0095 4.58341 17.3211ZM14.5834 17.3211C13.5532 16.2274 13 15 13 13.0103C13 9.51086 15.4565 6.37366 19.0306 4.82318L19.9233 6.20079C16.588 8.00539 15.9362 10.346 15.6756 11.822C16.2126 11.5443 16.9156 11.4466 17.6047 11.5105C19.4091 11.6778 20.8312 13.159 20.8312 15C20.8312 16.933 19.2642 18.5 17.3312 18.5C16.2581 18.5 15.232 18.0095 14.5834 17.3211Z\"><\/path>\n<\/svg>            <p class=\"text-xl xl:text-2xl text-white font-light leading-snug pb-8 border-b-1 border-white\/8\">To me, a comprehensive approach to cybersecurity is clearly the only reasonable one.<\/p>\n            \n                <div class=\"flex gap-4 xl:gap-6 items-start\">\n                                        <div class=\"flex flex-col\">\n                        <p class=\"mb-1 lg:mb-0 text-white font-medium text-sm lg:text-base\">Matthieu BENNASAR<\/p>\n                                            <\/div>\n                <\/div>\n\n\n                    <\/div>\n    <\/div>\n\n\n<p>The capacity to offer such a holistic stance on cybersecurity is becoming the main differentiator for cybersecurity providers.<\/p>\n\n\n\n<p>Thus, be careful who you entrust your cybersecurity with:\u00a0be sure to select companies with strong track record in 360\u00b0 expertise, for fear of receiving misguided, partial and biased advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Evolution of cybersecurity Since I started working in that field in 1999, cybersecurity has gone from being very low on the CIO agenda to consistently making it to the top positions on the CEO list of dreaded risks.\u00a0 While this has proven an arduous journey paved with lots of corporate casualties along the way, it &hellip; <a href=\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/\">Continued<\/a><\/p>\n","protected":false},"author":5,"featured_media":2218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[70],"tags":[],"class_list":["post-2217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Only Sensible Approach to Cybersecurity: A Holistic Vision<\/title>\n<meta name=\"description\" content=\"Cybersecurity can no longer rely on isolated tools. Discover why a holistic, risk-driven approach is the only sensible way to protect organizations today.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The only sensible approach to cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity can no longer rely on isolated tools. Discover why a holistic, risk-driven approach is the only sensible way to protect organizations today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Neverhack\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-21T14:57:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T09:41:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline MARIANNIE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline MARIANNIE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/\",\"url\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/\",\"name\":\"The Only Sensible Approach to Cybersecurity: A Holistic Vision\",\"isPartOf\":{\"@id\":\"https:\/\/neverhack.com\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1.jpg\",\"datePublished\":\"2026-01-21T14:57:38+00:00\",\"dateModified\":\"2026-02-13T09:41:46+00:00\",\"author\":{\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9\"},\"description\":\"Cybersecurity can no longer rely on isolated tools. Discover why a holistic, risk-driven approach is the only sensible way to protect organizations today.\",\"breadcrumb\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1.jpg\",\"contentUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1.jpg\",\"width\":2500,\"height\":1667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/neverhack.com\/b\/en\/home-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The only sensible approach to cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/neverhack.com\/b\/#website\",\"url\":\"https:\/\/neverhack.com\/b\/\",\"name\":\"Neverhack\",\"description\":\"Advanced cybersecurity solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/neverhack.com\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9\",\"name\":\"Caroline MARIANNIE\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Only Sensible Approach to Cybersecurity: A Holistic Vision","description":"Cybersecurity can no longer rely on isolated tools. Discover why a holistic, risk-driven approach is the only sensible way to protect organizations today.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The only sensible approach to cybersecurity","og_description":"Cybersecurity can no longer rely on isolated tools. Discover why a holistic, risk-driven approach is the only sensible way to protect organizations today.","og_url":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/","og_site_name":"Neverhack","article_published_time":"2026-01-21T14:57:38+00:00","article_modified_time":"2026-02-13T09:41:46+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1-1024x683.jpg","type":"image\/jpeg"}],"author":"Caroline MARIANNIE","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Caroline MARIANNIE","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/","url":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/","name":"The Only Sensible Approach to Cybersecurity: A Holistic Vision","isPartOf":{"@id":"https:\/\/neverhack.com\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1.jpg","datePublished":"2026-01-21T14:57:38+00:00","dateModified":"2026-02-13T09:41:46+00:00","author":{"@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9"},"description":"Cybersecurity can no longer rely on isolated tools. Discover why a holistic, risk-driven approach is the only sensible way to protect organizations today.","breadcrumb":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#primaryimage","url":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1.jpg","contentUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/01\/image-site-article-1.jpg","width":2500,"height":1667},{"@type":"BreadcrumbList","@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-only-sensible-approach-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/neverhack.com\/b\/en\/home-en\/"},{"@type":"ListItem","position":2,"name":"The only sensible approach to cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/neverhack.com\/b\/#website","url":"https:\/\/neverhack.com\/b\/","name":"Neverhack","description":"Advanced cybersecurity solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/neverhack.com\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/bd80a83f181aa3b592cc7bb6714299c9","name":"Caroline MARIANNIE"}]}},"lang":"en","translations":{"en":2217},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/2217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/comments?post=2217"}],"version-history":[{"count":13,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/2217\/revisions"}],"predecessor-version":[{"id":2794,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/2217\/revisions\/2794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media\/2218"}],"wp:attachment":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media?parent=2217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/categories?post=2217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/tags?post=2217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}