{"id":1098,"date":"2023-10-17T12:58:41","date_gmt":"2023-10-17T12:58:41","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=1098"},"modified":"2023-10-17T13:01:07","modified_gmt":"2023-10-17T13:01:07","slug":"beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/","title":{"rendered":"Beware the cost traps that can strain precious cybersecurity budgets"},"content":{"rendered":"<p>Recent data paints a conflicting picture in relation to cybersecurity budgets. Some research indicates that budgets are increasing healthily with CISOs eyeing up their next spending sprees. Other studies suggest security budgets are tightening or even being slashed despite previously being approved, hamstringing security strategies and creating risky blind spots.<\/p>\n<p>Several factors such as company size and sector undoubtedly play a role in the inconsistencies, but regardless of whether a CISO&#8217;s funds are plentiful or sparse, the opportunity to save money by avoiding hidden, unnecessary costs is surely universally welcome.<\/p>\n<p>Security investments can come with cost traps that aren&#8217;t always obvious but eat into security leaders&#8217; precious funds over time, without them ever realizing. These range from costs that are discernible with the right knowledge to others that are somewhat surprising, even for the most weathered of CISOs.<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/655295\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets.html\">Read the Full Story Here<\/a><\/p>\n<p>Source: CSO Online<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent data paints a conflicting picture in relation to cybersecurity budgets. Some research indicates that budgets are increasing healthily with CISOs eyeing up their next spending sprees. Other studies suggest security budgets are tightening or even being slashed despite previously being approved, hamstringing security strategies and creating risky blind spots. Several factors such as company [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beware the cost traps that can strain precious cybersecurity budgets - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware the cost traps that can strain precious cybersecurity budgets - Community\" \/>\n<meta property=\"og:description\" content=\"Recent data paints a conflicting picture in relation to cybersecurity budgets. Some research indicates that budgets are increasing healthily with CISOs eyeing up their next spending sprees. Other studies suggest security budgets are tightening or even being slashed despite previously being approved, hamstringing security strategies and creating risky blind spots. Several factors such as company [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-17T12:58:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-17T13:01:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/\",\"name\":\"Beware the cost traps that can strain precious cybersecurity budgets - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg\",\"datePublished\":\"2023-10-17T12:58:41+00:00\",\"dateModified\":\"2023-10-17T13:01:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg\",\"width\":1280,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware the cost traps that can strain precious cybersecurity budgets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware the cost traps that can strain precious cybersecurity budgets - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/","og_locale":"en_US","og_type":"article","og_title":"Beware the cost traps that can strain precious cybersecurity budgets - Community","og_description":"Recent data paints a conflicting picture in relation to cybersecurity budgets. Some research indicates that budgets are increasing healthily with CISOs eyeing up their next spending sprees. Other studies suggest security budgets are tightening or even being slashed despite previously being approved, hamstringing security strategies and creating risky blind spots. Several factors such as company [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2023-10-17T12:58:41+00:00","article_modified_time":"2023-10-17T13:01:07+00:00","og_image":[{"width":1280,"height":1920,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/","name":"Beware the cost traps that can strain precious cybersecurity budgets - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg","datePublished":"2023-10-17T12:58:41+00:00","dateModified":"2023-10-17T13:01:07+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2023\/09\/whitehathacker.jpg","width":1280,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/beware-the-cost-traps-that-can-strain-precious-cybersecurity-budgets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Beware the cost traps that can strain precious cybersecurity budgets"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=1098"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1098\/revisions"}],"predecessor-version":[{"id":1099,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1098\/revisions\/1099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/1077"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=1098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=1098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=1098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}