Related Posts
Subscribe via Email
Subscribe to our blog to get insights sent directly to your inbox.
The placebo effect is usually the realm of doctors and double-blind studies, not SOC analysts. Yet it creeps into our industry every day. Others have pointed out this parallel before. There’s writing on the security placebo effect, and Bruce Schneier has long warned about the dangers of security theater, those visible but hollow controls that make us feel safer without actually stopping threats. Those critiques are important, but they often stop at the “so what?” - we wasted money, we fooled ourselves, we bought a shiny dashboard that doesn’t really help.
The real risk isn’t only internal complacency; it’s how our misplaced spending reshapes the external threat landscape. Every time we fund a placebo solution instead of a meaningful one, we change the evolutionary pressure on attackers. We keep some adversaries fat and lazy, thriving on old tricks, while forcing others to adapt in ways that make tomorrow’s attacks more cunning and harder to defend. What we choose to fund (or neglect) creates cause-and-effect ripples that define how adversaries operate in the long run.
In medicine, a placebo is a sugar pill that looks like medicine. Patients take it and report feeling better, not because the pill did anything, but because the belief of treatment produces comfort. That same mechanism shows up in security. The “pill” is the shiny product demo, the new platform with buzzword-laden dashboards. Leadership feels reassured, customers are impressed, and the boardroom checks the box.
But the health analogy also carries the warning: if you treat migraines with a sugar pill instead of the right medication, the underlying illness doesn’t go away, it festers. Placebo security investments create the same long-term damage. They give us confidence without capability. They lull us into ignoring the fundamentals, and they divert resources from defenses that would actually keep attackers at bay. The sugar high wears off, but the breach risk remains.
If we know these things don’t always work, why do we keep buying them? Psychology and incentives drive it.
The net result: we are conditioned to buy shiny things, even when we suspect they are placebo, because it eases fear, signals importance, secures social validation, and makes our partners money.
This is where the story takes a darker turn. Adversaries don’t read our budgets, but they don’t need to. They run their playbooks, and the results tell them everything they need to know.
If an attack works if phishing emails land, if credentials are unprotected, if unpatched systems crumble, they have no reason to evolve. Why invest in new tricks when the old ones still pay the bills? Weak security lets adversaries stay lazy.
If an attack fails because defenses were strong, alerts were investigated, or credentials were hardened, attackers get the opposite message. They must adapt. They must innovate. They must evolve their tools and tactics if they want to keep feeding their families.
This is attacker Darwinism in action. Our budgeting, strategy, and focus determine which adversaries thrive and which are forced to evolve. When we overspend on placebo solutions, we unintentionally preserve the easy, profitable attack avenues. We keep the cybercriminal ecosystem fat and happy. When we invest in real controls, adversaries are forced to work harder, spend more, and narrow their profit margins.
The arms race isn’t just between nations or APT groups. It’s between every CISO’s budget line and the attacker’s business model.
The cure isn’t glamorous, but it’s proven:
The placebo effect teaches us that belief is powerful. But belief without capability is dangerous. Our industry has tolerated too much snake oil; solutions sold on fear, FOMO, and incentives rather than results. We need to stop confusing security theater with security reality.
Attackers don’t care about our dashboards; they care about our gaps. By refusing to fund placebos, we send a message - not just to vendors, but to adversaries - that we’ll no longer be predictable in our misallocations. We’ll spend where it counts. We’ll close the easy doors. And in doing so, we’ll force attackers to actually work for their payday.
It’s time to end the placebo era in cybersecurity. No more sugar pills, no more snake oil. Just defenses that deliver.
Want to talk about what a true defense strategy could look like at your organization? Consult with our experts.
Don't miss another article. Subscribe to our blog now.
Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.
Subscribe to our blog to get insights sent directly to your inbox.