.st0{fill:#FFFFFF;}

Why Traditional Threat Detection Is No Longer Enough: A Call to Action for CISOs & Cyber Risk Leaders 

 November 8, 2025

By  Jane Frankland

Would you trust a security guard using a 1990s mugshot book to identify criminals in an era of deepfakes and face-changing AI?

Of course you wouldn’t!

Yet many organisations are still relying on traditional threat detection approaches to counter modern cyberattacks. Systems once fit for purpose are now dangerously outdated in a world where the average cost of a data breach has reached $4.45 million (IBM, 2025) and hackers are using AI, machine learning, and automation to move faster, smarter, and with greater precision than ever before.

This is no longer a technical issue; it’s a core business risk.

Consider the fact that 61% of organisations still depend on legacy, signature-based Web Application Firewalls (WAFs) as their main line of cloud defence. With AI-driven polymorphic malware now evading static controls, working exploits for published CVEs ready in 10-15 mins and costing $1, and reducing detection windows to seconds, the latest research from Elastic how untenable this approach has become.

Here are some key findings:

  1. Hackers are retooling for speed, prioritising immediate execution over stealth.
  2. AI is lowering the barrier to entry for cybercrime, allowing hackers to generate new attack tools at scale.
  3. Cloud attacks are increasingly identity-based.
  4. Browser credential theft has industrialised, fuelling the access broker economy.
  5. Source code leaks now create permanent, distributed exposure that extends far beyond the traditional perimeter.

The uncomfortable truth?

Relying on traditional threat detection is no longer a security posture — it’s a liability.

In this blog, I’m digging deeper into why traditional threat detection is failing, how attackers are exploiting the gaps, and what CISOs and risk leaders can do to modernise threat detection strategies. I’m partnering with Elastic, and drawing on insights from their latest Global Threat Report for 2025, and a recent interview with their CISO, @MandyAndress.

When you tune into my interview with Elastic’s CISO, Mandy Andress you’ll hear her view on the threat landscape, the key challenges, and how Elastic is tackling advanced global threat detection.

The Business Risk

Cyber risk isn’t just technical — it’s existential.

Consider a recent large-scale cyberattack on a major manufacturer which brought production to a halt, costing tens of millions per week. Within a month, estimated revenue losses had climbed into the billions, forcing the organisation to seek emergency financial support to stabilise operations.

The lesson was clear: modern threat detection failure has real-world business consequences.

  • Employees and suppliers can’t work, triggering lost wages across the supply chain.
  • Smaller partners may face insolvency without assistance.
  • Governments are socialising the cost of corporate cyber failures as part of the fallout.

This is the new face of cyber risk. Hackers don’t just steal data — they paralyse operations, disrupt economies, erode trust, and threaten national resilience.

This is the new face of cyber risk. Hackers don’t just steal data; they paralyse operations, devastate supply chains, erode trust at every level, and threaten national security.

The Shortcomings of Traditional Threat Detection

Traditional threat detection tools were built for a world that no longer exists — one of static environments and predictable threats. Today’s hackers exploit those gaps relentlessly.

Signature-Based Detection Can’t Keep Up

Traditional threat detection tools depend on matching known threat signatures. But with AI-driven polymorphic malware reshaping its code thousands of times per hour to avoid detection, static signatures are obsolete. As for zero-day exploits, already unknown to defenders, they simply slip past.

Volume and Velocity Overload Analysts

Modern enterprises generate vast telemetry across endpoints, networks, and cloud environments, but traditional threat detection tools struggle to correlate data at the required speed. Overwhelmed and desensitised by alert floods, SOC teams either chase false positives or disable alerts to reduce noise – allowing genuine compromises to slip through unnoticed. Today, approximately 40% of alerts are ignored or left un-investigated due to resource constraints. A stark example is the 3CX supply-chain attack, where legitimate alerts were initially dismissed as false positives – a delay linked directly to alert fatigue and the cyberattack.

Lack of Contextual Awareness

Traditional threat detection tools flag suspicious activity but lack context – the who, what, where, and why. Without correlating signals across endpoints, cloud, and identity systems, security teams can misclassify critical events, allowing attackers to blend in with normal activity.

Disconnected Systems and Silos

Traditional threat detection tools often operate in silos, failing to integrate across the full security stack. This fragmented approach hampers visibility and delays incident response. For example, one enterprise fell victim to a phishing-led intrusion because its email gateway and endpoint systems couldn’t communicate in real time – creating a critical gap that hackers swiftly exploited.

The Industrialisation of Modern Threats

Browser-Based Credential Theft

The browser is now a major weak point in cybersecurity, with over 1 in 8 malware programs designed to steal sensitive browser data. For example, attackers are using tactics like “ClickFix” campaigns, where employees are tricked into following seemingly harmless instructions – such as copying and pasting a command – only to unknowingly install malware. This malware then harvests browser-stored passwords, cookies, and autofill information, giving attackers direct access to corporate accounts. These stolen credentials fuel the access broker economy, giving attackers the keys to corporate accounts — a threat traditional network-based defences were never designed to counter.

Insider Risks and Social Engineering

Traditional threat detection tools were built to defend against external attacks, not the growing risks posed by insiders or human-driven exploits. Recent attacks on UK retailers as well as manufacturing companies, began with social engineering tactics. Employees were tricked into handing over access credentials, which hackers then used to move laterally through systems, escalating their access unnoticed.

In another example, BBC correspondent Joe Tidy revealed how he was approached by a cybercriminal offering him 15% of any ransom payment if he gave them access to his work laptop. Similarly, an IT worker in Brazil was arrested for selling his login credentials to hackers, leading to a $100m loss for a banking victim.

Emerging Attack Surfaces

The rapid expansion of remote work, IoT, and multi-cloud environments has created an attack surface far beyond what traditional tools were built to protect.

Traditional threat detection tools, designed for static, perimeter-based environments, struggle to provide visibility into hybrid infrastructures. This leaves critical blind spots, such as unsecured IoT devices, misconfigured cloud services, and vulnerabilities in remote work setups.

These gaps create opportunities for attackers to exploit modern environments, exposing organisations to risks that traditional defences were never designed to counter.

The New Attack Surface: Cloud, Code, and AI

Cloud Under Siege: The rapid expansion of remote work, IoT, and multi-cloud environments has created an attack surface far beyond what traditional tools were built to protect. Today, over 60% of cloud security events stem from just three adversary goals: Initial Access, Persistence, and Credential Access. Hardening identity and authentication flows is now the most effective way to protect cloud workloads.

Source Code Leaks:A single accidental commit can create lasting exposure in distributed repositories. Elastic’s internal investigations revealed how sensitive data — such as API keys and even a passport photo — was unintentionally committed to GitHub. Once embedded in the repository’s immutable history, this information became nearly impossible to fully remove, as copies could persist in forks, clones, or cached versions.

AI as an Adversary Weapon:Elastic Security Labs observed a 15.5% rise in “generic” threats, likely driven by hackers using LLMs to mass-produce simple but effective malware loaders. AI has democratized hacking, giving even low-skilled threat actors access to powerful tools.

A Strategic Roadmap for CISOs

To build resilience in this new landscape, CISOs and cyber risk owners must lead the shift from traditional threat detection to modern, intelligence-driven security.

  • Prioritise Identity and Browser Security: Strengthen authentication with robust phishing resistant MFA and harden browser defences against credential theft.
  • Bolster Cloud and Endpoint Visibility: Invest in platforms offering unified visibility, behavioural analytics, memory protection, and anomaly detection to counter stealthy, fileless threats.
  • Embrace Human-in-the-Loop Automation: Leverage AI by combining AI-assisted detection with human oversight to accelerate response without sacrificing judgment.
  • Secure the Development and Supply Chain Ecosystem: Extend monitoring into developer environments, IDEs, and third-party libraries to secure every link in the chain.

To End

The threat landscape is evolving fast – and so must threat detection. Traditional threat detection tools aren’t just underperforming; they’re actively increasing risk exposure.

For today’s CISOs and cyber risk leaders, the choice is clear: modernise threat detection or accept preventable risk. The future belongs to organisations that can detect, contextualise, and respond at machine speed.

There’s no better time than the present to ask yourself, is your detection strategy built for yesterday’s attacks or today’s and tomorrow’s?

To understand how threat behaviours are evolving – and how your organisation can stay ahead, download the 2025 Elastic Global Threat Report.

Now I Want to Hear from You

Tell me, where are the biggest gaps in threat detection today, and what do you think we, as a community, need to do better? Join me on LinkedIn for a conversation where you can let me know your thoughts, and if I’ve missed anything!

Finally, in the spirit of full disclosure, please be aware that I’ve received compensation for promoting this thought leadership blog for Elastic. Because your success is important to me, I only align myself with brands I believe in, and Elastic is one of them.

Did you enjoy this blog? Search for more blogs that you want to read!

Jane frankland

 

Jane Frankland MBE is an author, board advisor, and cybersecurity thought leader, working with top brands and governments. A trailblazer in the field, she founded a global hacking firm in the 90s and served as Managing Director at Accenture. Jane's contributions over two decades have been pivotal in launching key security initiatives such as CREST, Cyber Essentials and Women4Cyber. Renowned for her commitment to gender diversity, she authored the bestselling book "IN Security" and has provided $800,000 in scholarships to hundreds of women. Through her company KnewStart, and other initiatives she leads, she is committed to making the world safer, happier, and more prosperous.

Follow me

related posts:

Get in touch