Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Why Cross-Training in Networking and Cybersecurity Matters

Posted on October 7, 2025October 7, 2025 By CWS

Raleigh, United States, October seventh, 2025, CyberNewsWire

Report Exhibits Cross-Coaching as Strategic Resolution to Operational Friction Between Networking and Cybersecurity Groups 

INE Safety, a number one supplier of cybersecurity coaching and certifications, at this time introduced the outcomes of a world examine inspecting the convergence of networking and cybersecurity disciplines.

“Wired Collectively: The Case for Cross-Coaching in Networking and Cybersecurity” relies on insights from almost 1,000 IT and cybersecurity professionals worldwide.

The report paperwork operational challenges created by this convergence and presents cross-training because the strategic resolution.

“Our analysis reveals that whereas three-quarters of execs acknowledge networking and cybersecurity as built-in disciplines, the bulk nonetheless battle with day by day operational friction between these groups,” mentioned Lindsey Rinehart, CEO of INE Safety.

“Organizations with excessive ranges of safety and IT complexity face breach prices averaging $1.2 million increased than these with streamlined, built-in environments.

This isn’t nearly future preparedness—it’s about fixing issues which might be costing organizations cash at this time.”

The report reveals that solely 33% of execs really feel “very effectively” or “extraordinarily effectively” ready to deal with the intersection of networking and cybersecurity, whereas 41% report being solely “reasonably effectively” ready.

This preparedness hole creates vital operational challenges but additionally presents strategic alternatives for organizations that spend money on cross-domain experience.

“Cross-trained professionals don’t simply reply to incidents sooner—they stop the implement-break-fix cycles that plague most organizations,” Rinehart added.

“When groups perceive each networking and safety domains, tasks deploy efficiently the primary time, emergency rollbacks develop into uncommon, and operational prices lower considerably.”

Key findings from the report embrace:

Integration Actuality: 75% of respondents view networking and cybersecurity as both “fully built-in” (29%) or “extremely interconnected” (46%), with solely 7% nonetheless viewing them as separate disciplines.

Preparedness Hole: Solely 33% really feel well-prepared to deal with networking-cybersecurity intersection, creating operational vulnerabilities and elevated prices.

Collaboration Challenges: Whereas 37% collaborate with counterparts “more often than not” or “at all times,” 34% collaborate solely “typically,” and 23% work collectively “about half the time.”

Crucial Friction Factors: Almost one in 5 professionals (18%) recognized data gaps as their major problem, whereas organizational misalignment impacts almost 1 / 4 of respondents.

Convergence Drivers: 77% cite rising cyber menace complexity as the first convergence driver, with widespread cloud adoption, distant work, and IoT machine proliferation accelerating integration.

Six Crucial Overlap Areas: Community monitoring, safety monitoring, firewalls, configuration administration, detection, and entry management characterize probably the most vital convergence factors the place cross-training delivers speedy advantages.

INE Safety’s suggestions for organizations embrace:

4-Step Cross-Coaching Implementation: Conduct talent assessments, deploy different coaching methodologies, measure influence and ROI, and scale profitable applications

Enhanced Menace Detection: Develop complete visibility throughout community structure and safety implications to scale back incident response instances

Operational Excellence: Streamline workflows to scale back handoffs between specialised groups and get rid of failed implementations

Value Optimization: Scale back downtime prices (averaging $5,600 per minute) by means of improved incident response and built-in operations

The report emphasizes that profitable cross-training transforms organizational tradition by creating frequent language between groups, enabling balanced decision-making, streamlining operations, and bettering expertise retention by means of diminished office friction.

“Breaking down safety silos and fostering cross-team cooperation is important for responding to the accelerating tempo of cyber threats,” Rinehart concluded.

“Organizations that spend money on growing professionals who can converse each languages will achieve measurable benefits in menace detection, operational effectivity, and enterprise resilience.”

The complete report is accessible for obtain at study.ine.com/report/wired-together.

About INE Safety:

INE Safety is the premier supplier of on-line networking and cybersecurity coaching and certification.

Harnessing a strong hands-on lab platform, cutting-edge know-how, a world video distribution community, and world-class instructors, INE Safety is the highest coaching selection for Fortune 500 firms worldwide for cybersecurity coaching in enterprise and for IT professionals seeking to advance their careers.

INE Safety’s cybersecurity certifications are requested by HR departments worldwide, and its suite of studying paths affords an incomparable depth of experience throughout cybersecurity and is dedicated to delivering superior technical coaching whereas additionally reducing the boundaries worldwide for these seeking to enter and excel in an IT profession.

Contact

Chief Advertising OfficerKim LuchtINE Safety[email protected]

Cyber Security News Tags:CrossTraining, Cybersecurity, Matters, Networking

Post navigation

Previous Post: Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses
Next Post: BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Related Posts

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware Cyber Security News
McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
Identity Theft Surges as Criminals Deploy Advanced Tactics to Steal Personal Data Cyber Security News
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Cyber Security News
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News