By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Beyond integration theatre: Building stronger cyber platforms | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Beyond integration theatre: Building stronger cyber platforms | Computer Weekly
News

Beyond integration theatre: Building stronger cyber platforms | Computer Weekly

News Room
Last updated: 2026/03/18 at 7:21 AM
News Room Published 18 March 2026
Share
Beyond integration theatre: Building stronger cyber platforms | Computer Weekly
SHARE

Modern chief information security officers (CISOs) face a threat landscape defined by distributed systems, volatile supply chains, and expanding attack surfaces. Platform consolidation is often used to reduce complexity, yet only architectures with deep integration across data, control, and identity planes achieve the intended security benefits. This makes the integration layer a dominant source of enterprise risk.

While unified security platforms promise simplicity, attackers are increasingly bypassing core systems and exploiting the connections between them: API links, OAuth tokens, third‑party apps, and automation workflows. These integrations quietly expand the enterprise trust boundary and introduce new single points of failure. Over‑privileged tokens, undocumented workflows, vulnerable open/closed source components, and fragmented ownership make it possible for attackers to authenticate themselves through trusted integrations rather than breach the platform directly.

All this means that this integrated layer, not the platform itself, is the new enterprise perimeter, meaning CISOs must govern delegated trust with the same rigour as they do for core systems. When converging multiple solutions they must mitigate the inherent security risks that come with single‑point‑of‑failure systems through architectural redundancy and modularity and ensure true integration.

Demand evidence of true integration, not integration theatre

There are several factors that distinguish a true platform from integration theatre. Scrutinising these will show where vendors are using marketing to obscure a lack of genuine integration:

Data: A platform should decouple the data plane from the control plane. At the data layer, it should allow for a single data lake that all security logs feed into and all solutions read from simultaneously. Aggregated data can then be correlated to deliver full visibility across systems and detect sophisticated multi‑stage attacks instead of having multiple databases connected via APIs and sync actions.

Policy orchestration: Policies should be written once, be consistent and propagated across the stack, from endpoints and email to firewalls and intrusion detection systems (IDS), without the need to deploy them through different user interfaces (UIs).

Identity and authorisation: All platform components should integrate through a common identity broker, using a central policy orchestrator to enforce both Role‑Based and Attribute‑Based Access Control consistently across the environment. Multiple logins, inconsistent roles, or fragmented identity experiences are strong indicators of integration theatre rather than true unification.

Interoperability: Integration theatre provides a collection of black boxes with no meaningful influence on each other. Unified solutions, on the other hand, work together and do not just coexist. They use telemetry to provide context and build a complete attack‑path picture, offering seamless connectivity to edge devices and third parties, such as Microsoft Defender’s 57 API connectors or Cisco’s 100+ third‑party integrations.

Architect for resilience, not dependency

Vendor consolidation can simplify environments but also create monocultures and single points of failure. To avoid over‑reliance on any one platform, organisations should adopt a cyber security mesh architecture. This is a central policy source with distributed enforcement across global locations, ensuring that critical controls remain functional even if the core platform fails. Pairing the platform with best‑of‑breed niche tools preserves flexibility and reduces vendor lock‑in. The Q3 2025 Forrester Zero Trust Landscape reinforces the view that zero-trust has to be an overall strategy, not a single product. This can then build higher resilience, greater architectural flexibility, and a reduced likelihood that systemic platform failure will lead to business disruption.

Govern the integration layer as a first-class asset

With integrations now acting as primary vectors of delegated trust, organisations must treat them with the same scrutiny as they would for any core security asset. This requires continuously inventorying all integrations, enforcing least‑privilege API scopes, mandating short‑lived and automatically rotated credentials, and applying real‑time anomaly detection to API behaviour. Threat modelling must precede deployment, and integration risk must be embedded into third‑party governance frameworks.

When exposure is high, organisations should rapidly map critical integrations, assess token lifetimes and privilege levels, and execute targeted remediation such as rotation, down‑scoping, monitoring, or removal. They should create a tightly controlled blast radius, a hardened identity perimeter, and a measurable reduction in delegated trust risk as these are the very factors attackers increasingly exploit.

Organisations that succeed will be those that govern the integration layer with the same discipline as the platforms themselves. That means CISOs must look beyond vendor claims and examine how data, identity, and policy truly operate. Authentic platforms share telemetry, policy engines, and a unified identity layer, while theatrical ones rely on brittle connectors.

But they need to recognise that even the strongest platform reshapes risk rather than removing it. To prevent the platform becoming a single point of failure, organisations must pair consolidation with disciplined governance of delegated trust, continuous integration‑layer risk assessment, and architectural safeguards such as mesh‑based enforcement and distributed control planes. The strongest strategy blends unified efficiencies with the resilience and scrutiny required to withstand inevitable failures.

Joe Mayhew and Ahmed Tikail are cyber security experts at PA Consulting

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 'Nobody really knows:' Pentagon clash with Anthropic throws agencies into limbo 'Nobody really knows:' Pentagon clash with Anthropic throws agencies into limbo
Next Article Black Myth: Wukong nominated for Game of the Year at 2024 Steam Awards · TechNode Black Myth: Wukong nominated for Game of the Year at 2024 Steam Awards · TechNode
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

It’s not just you: Pixel owners report freezing lock screens after March Pixel Drop
It’s not just you: Pixel owners report freezing lock screens after March Pixel Drop
News
Apple iPhone 17e Review
Apple iPhone 17e Review
Gadget
DLSS 5: Has Nvidia’s AI graphics technology gone too far?
DLSS 5: Has Nvidia’s AI graphics technology gone too far?
News
PwC’s US IPO Lead On The 2026 Outlook, IPO Timing And The Secondary Boom
PwC’s US IPO Lead On The 2026 Outlook, IPO Timing And The Secondary Boom
News

You Might also Like

It’s not just you: Pixel owners report freezing lock screens after March Pixel Drop
News

It’s not just you: Pixel owners report freezing lock screens after March Pixel Drop

4 Min Read
DLSS 5: Has Nvidia’s AI graphics technology gone too far?
News

DLSS 5: Has Nvidia’s AI graphics technology gone too far?

1 Min Read
PwC’s US IPO Lead On The 2026 Outlook, IPO Timing And The Secondary Boom
News

PwC’s US IPO Lead On The 2026 Outlook, IPO Timing And The Secondary Boom

16 Min Read
Mobile Server-Driven UI at Scale
News

Mobile Server-Driven UI at Scale

52 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?