Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Your Security Program Was Built for a Threat Landscape That No Longer Exists
Published:
April 13, 2026

Your Security Program Was Built for a Threat Landscape That No Longer Exists

By:
Beth Robinson
Share icon
Glitch effectGlitch effectGlitch effect

More tools. Healthy budgets. Hard-working teams. And yet, security is still falling behind. The problem isn’t a lack of effort. It’s that many security programs were designed for a threat landscape that doesn’t exist anymore. The defender’s playbook hasn't kept up, and the gap is showing.

To put hard numbers behind it, Huntress surveyed 1,050 internal IT and security professionals across North America and the UK. The findings shaped our latest report, How to Build a Resilient Security Team for 2030. 

We wanted the unfiltered truth about modern cybersecurity. We asked where teams feel prepared, where they don't, and what's getting in the way. 

What we found should change the way you think about building a resilient security team for the future.


Key takeaways

  • Most security teams are small. The majority of surveyed teams surveyed are between six and 15 people, with nearly one in five organizations relying on a single person to handle all cybersecurity responsibilities. These teams aren't failing because of a lack of effort. They're operating with programs designed for a different era against threats that have fundamentally changed.

  • Budget isn't always the core problem. Nearly three-quarters of respondents rate their IT budget as at least adequate, and more than a quarter allocate 16–20% of that budget to security. The financial resources exist. What's missing is clarity around what matters most and who owns the next decision.

  • Alert noise steals the time your team needs most. Speed of detection and response is the top measure of success, but nearly two-thirds of teams report that at least 25% of their alerts are just noise. Every false positive is time an attacker spends moving deeper into your environment. Auditing your alert quality is key to better security. 

  • Resilience is about decisions under pressure, not just tools on a shelf. The teams that come out ahead aren't necessarily the ones with the biggest budgets or the most headcount. They’ve clarified ownership before an incident, designed systems that catch human error, rather than assume it won't happen, and made the deliberate shift from "prevention only" to resilient operations.


The teams behind the data

Before we get into the findings, it helps to understand who we're talking about.

Most of the teams in this survey are small. The most common team sizes fall between six and 10 people (21.4%) and 11–15 people (19%). Only 39.6% of respondents have a dedicated in-house cybersecurity team. Another 35% say IT and security responsibilities are shared among the same people, and 18% say cybersecurity is handled by a single person.

These aren't teams with unlimited resources and a 24/7 Security Operations Center (SOC). These are people doing the best they can with what they have. And they’re doing it well, in many cases.

Budget isn't the core issue, either. Nearly three-quarters of respondents (72.3%) rate their IT budget as at least adequate, and more than a quarter allocate 16–20% of their IT budget to cybersecurity. The resources exist, so why do outcomes still lag?

Figure 1: Sizes of surveyed IT and security teams


The real problem is that security programs are built for yesterday's threats

As the business world becomes increasingly digital, IT and security teams face a rapidly shifting threat landscape. To manage this, many organizations have invested in solutions that rely on tools layered over time. What’s troubling, though, is that many of these security programs were designed with yesterday's threats in mind. They were built to detect malware and other traditional endpoint attacks, rather than spot access abuse or unauthorized use of identities.

Identity-based attacks, like business email compromise (BEC), account takeover, and session hijacking, are what teams feel least prepared to defend against (26.5%), according to the survey data. 

Jenko Hwong, Principal Product Researcher of Identity Threat Detection and Response (ITDR) at Huntress says:

“Identity used to be about passwords and MFA. In the cloud, it’s sessions, tokens, and apps—and that’s where most teams are behind.”

What makes this more alarming is that while speed of detection and response is the top measure of security program success, nearly two-thirds of teams (64.1%) report that at least 25% of their alerts are just noise, leaving businesses vulnerable to emerging identity threats. While security teams are buried in false positives and low-priority signals, attackers get the one thing they need most: time.

Figure 2: Where organizations feel more exposed, by attack type


Real-world incident: Identity threats in action

Here's what this looks like in practice. We recently detected an identity compromise coming from a suspicious, newly seen data center location. Our SOC jumped on this threat right away and disabled the compromised account before any damage could spread. But here's where human judgment made all the difference: the team didn't stop there.

Analysts used the suspicious hosting provider associated with the initial compromise to pivot across Huntress' ITDR telemetry, searching for other accounts that had authenticated from the same location. They found multiple additional compromised accounts, which were all identified, reported, and secured.

No malware. No exploit. Just a valid login from the wrong place, and a human-led, AI-centric SOC team that knew how to follow the thread. That's what identity threat detection and response looks like when it works.

Figure 3: An example of the Huntress SOC shutting down an identity threat


AI amplifies what lean teams can do 

Intentionally deployed AI can change the equation for lean teams. Rather than a luxury reserved for enterprise organizations with massive headcounts, AI levels the playing field for smaller ones. 

Nearly half of the professionals we surveyed (46.9%) rate AI as a critical part of their security strategy. And the way most teams use it says a lot. The top use cases are: 

  • Threat detection (69%)

  • Analyzing user and entity behavior (55.3%)

  • Automated incident response (51%)

  • Threat investigation (49%) 

In other words, teams are using AI to accelerate analysis, reduce noise, and shorten response time. For a six-person team carrying the security weight of a 500-person organization, AI can handle high-volume, repetitive work so that your analysts aren't burned out before the real threats show up.

Anna Pham, Senior Tactical Response Analyst at Huntress, states: 

“AI saves people from burnout—but humans still have to verify what matters.”

Resilient teams purposefully design systems that bring AI and people together to reduce cognitive load, protect human judgment, and speed up the decisions that matter most. People are supported, not replaced, with the goal of making fewer decisions and better ones when it counts.

Figure 4: How security teams are using AI


What can you do right now to build a resilient team?

The data points to a clear path forward, and it doesn't start with buying more technology. It starts with asking better questions.

  • Audit your alert quality. What percentage of your alerts actually lead to meaningful action? If more than a quarter of your time is spent on noise, your team is burning time and energy on signals that don't matter. That's time stolen from the threats that do.

  • Treat identity as a primary attack surface. Multi-factor authentication (MFA) and SSO are a starting point, not a finish line. Do you have visibility into session behavior, SaaS permissions, and token usage?

  • Clarify ownership before the next incident. When something goes wrong, does everyone know their role? If there's any ambiguity, that's the first thing to fix.

  • Design for humans, not perfection. When your systems fail, is it because people made mistakes or because the systems assumed they wouldn't? Even well-trained employees make mistakes under pressure. Build systems that catch those mistakes early, rather than ones that assume they won't happen.

Resilience is about more than just headcount or budget. It means your team has to be able to make decisions under pressure. The good news is that the shift from "prevention only" to "resilient operations" doesn't require a complete overhaul. It requires deliberate design and willingness to build for the threat landscape that actually exists today.

The teams that come out ahead will be the ones who made purposeful decisions before the next incident forced their hand.

If you’re ready to start building a more resilient security team, let Huntress help guide you. Download How to Build a Resilient Security Team for 2030.  





Categories
Huntress News
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

Don't let "later" cost you

Join us on May 20 (12pm EST) for _declassified, for an unfiltered look from Truman Kain at the overlooked security obligations that hit hard later.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Put a SOC in It: How Huntress Managed EDR Stands Against the Competition

    Depending on which EDR solution you choose, capabilities and outcomes can differ greatly. Huntress looks at what differentiates Huntress Managed EDR from competitors, reviewing key features and benefits.
  • Humans vs. AI: The Critical Role of Human Expertise in Cybersecurity

    Can AI ever fully replace humans in cybersecurity? We argue that human-powered security is the key to staying one step ahead of today’s threats.
  • The Craftiest Trends, Scams, and Tradecraft of 2025 (So Far)

    John Hammond and Greg Linares with Huntress discuss the top tradecraft we’ve seen this year so far, from ClickFix attacks to deepfake social engineering
  • New 0-Day Vulnerabilities Found in Microsoft Exchange

    The Huntress team is currently investigating new 0-day vulnerabilities in Microsoft Exchange servers, piggybacking on ProxyShell and ProxyLogon.
  • Top Takeaways from hack_it 2021

    A recap of hack_it 2021, a virtual security training event packed with interactive exercises, malware analysis, hacking workshops and more.
  • 7 Key Manufacturing Cybersecurity Trends

    Explore the latest manufacturing cybersecurity trends, from ransomware to OT takeovers, and real-world risks to production. Learn how to secure your plant.
  • Practical Tips for Conducting Digital Forensics Investigations

    A digital forensics investigation can be tedious. Fortunately, there are some efficient ways that you can still achieve success as an investigator.
  • Addressing Initial Access

    Series of blog posts that share the breadth and depth of Huntress’ experience to assist others in reducing their attack surface, and inhibiting or even obviating cyber attacks.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy