TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Cyber

Cycle of active inertia

by Mark Rowe

A lot within cybersecurity has remained constant since the inception of the computer: passwords still get shared, confidential data still leaks, and attackers still hide in the shadows. What has changed, drastically, is the environment these weaknesses now sit in. Digital systems underpin critical economic activity, keeping supply chains moving and essential services running, writes Gavin Millard, pictured, Senior Vice President, EMEA at Tenable.

Yet, despite this seismic shift in the threat landscape, many organisations are trapped in active inertia. This management phenomenon occurs when leaders respond to disruptive change by accelerating the activities that brought them past success. Like a car stuck in the mud, the wheels spin furiously and the engine roars, but the vehicle only digs itself deeper into the rut. In cybersecurity, this isn’t a lack of effort; it is the dangerous acceleration of outdated “success formulas” in a world that no longer rewards them.

When Success Becomes a Trap

Security teams often believe their biggest hurdle is an uninformed executive board. In reality, the issue is rarely ignorance, it is the calcification of legacy strategic frames. Boards are rarely apathetic; most are terrified of being the next headline and are actively approving cyber spend. The problem is that they are suffering from active inertia, treating a “passed audit” as a synonym for “secure”.

This creates “strategic blinders” where processes become rigid routines. We see teams drowning in spreadsheets, working 80-hour weeks to patch “critical” vulnerabilities that represent zero actual risk, simply because a policy written a decade ago says so. Following a framework becomes an unquestionable dogma, even as attackers move from initial breach to full domain compromise in hours. When the threat environment shifts from human-scale to automated exploitation, doing the wrong things faster only speeds the collapse.

The Circuit Mindset: Measuring Resistance

To break this inertia, we must stop viewing our environment as a static list of compliance building blocks: CVEs; identities; misconfigurations; and exposed assets. While tools like Attack Path Analysis (APA) help, they often just draw lines between parts in a pile without capturing the dynamic nature of an attack.

A more pragmatic mental model is to think of exposure as a circuit. Attackers behave like electrical current, naturally flowing through the path of least resistance. It doesn’t matter if a path is long or short, a complex path with zero resistance is infinitely more dangerous than a short path requiring nation-state level effort to traverse.

True proactive security is about raising the resistance at the steps that matter. We must identify the “resistors” and not just high CVSS scores but the weak passwords and cloud misconfigurations that offer zero resistance. We must also recognise “voltage”: a vulnerability actively exploited in the wild carries a far higher charge than a theoretical flaw on a test server.

Culture Over Compliance

Technical controls like continuous monitoring and secure architecture are vital, but without a shift in team culture, even advanced tools fall short. Active inertia is often reinforced by a fear-driven culture that discourages transparency, causes team burnout and slows remediation.

Real resilience requires psychological safety. Practical initiatives, such as “vulnerability amnesties,” allow teams to identify and fix weaknesses without fear of repercussion for past oversights. This breaks the cycle of inertia by prioritising actual risk reduction over the mere appearance of following a process.

Building True Resilience: Absorbing the Shock

Cybersecurity is no longer just about 100 per cent prevention — a mathematical impossibility. The focus must shift to how organisations can absorb shock while continuing to function. This requires:

● Safe Degradation: Designing systems so they don’t fail all at once.

● Leadership Clarity: Boards need a direct line of sight from a cyber incident to its financial and strategic impact.

● Modern Cadence: Moving from 90-day patch cycles to a 24-to-72-hour window for exploitable assets that could lead to a business impact.

This shift is critical in the supply chain, where relying on annual questionnaires — a classic “busy work” routine — is no longer sufficient. With one in 10 UK businesses stating they would be unlikely to survive a major cyber attack, the economic fallout is too great to ignore.

The AI Reality Check

The urgency to pivot is driven by the speed of AI adoption within the attacker economy. AI-powered attackers use ruthlessly efficient automation to exploit low-resistance exposures at scale. You cannot scale a linear, human process to match exponential machine speed. If you fight AI-driven attacks by simply demanding analysts close more tickets or shrinking SLAs, you have already lost.

To outpace the modern attack, we must fight AI automated attacks with AI powered mobilisation. The prioritisation of what matters and the remediation of those issues must be as automated as the attack itself.

Conclusion

The differentiator in the modern landscape will be leadership that recognises when old success formulas have become liabilities. By fostering healthy team dynamics, adopting a “circuit mindset” to measure resistance, and treating cybersecurity as a strategic business issue, organisations can finally gain the traction they need to break the cycle of active inertia.

Related News

  • Cyber

    Automatic cyber reflexes

    by Mark Rowe

    John Trest, Chief Learning Officer at the cyber firm VIPRE Security Group, pictured, says that physical security behaviours offer compelling parallels to…

  • Cyber

    Arculus acquired

    by Mark Rowe

    The UK cyber security firm Bridewell has acquired the public sector cyber security firm Arculus Cyber Security. Bridewell says this will increase…

  • Cyber

    AI and phishing: a toxic pair

    by Mark Rowe

    AI is changing cybersecurity faster than any technology before it. While it promises enormous potential from a cyber defence perspective, it has…