March 17, 2022
Originally published on Dark Reading.
According to a Cisco CISO Benchmark survey, 17% of organizations had 100,000 or more daily security alerts in 2020, and its trajectory has only increased.
Source: Cisco 2020 CISO Benchmark Survey
2021 only followed this trend with a record year of newly-discovered CVEs – 20,137 to be exact, topping the 2020 record of 18,325. More software and an increased digital footprint equals a record number of vulnerabilities. Aside from this being an indicator of the exposure growth in an organization’s attack surface, this unmanageable number makes the defender’s job even more difficult, and also leads to burnout among cybersecurity professionals.
It’s clear that vulnerable does not equal exploitable. In fact, the common ratio between vulnerable in theory and exploitable in practice is 1:100. So how can security teams focus on the true weakness in the vulnerability hay stack? The answer lies in the context of a vulnerability, its compensating controls, and the data it leads to.
In this article, we’ll provide steps security professionals can take today in order to identify the true risk their organization faces – how to pinpoint the exploitable vulnerabilities out of the lot.
Below are 4 steps to knowing your exploitable attack surface
Automated security validation is an advanced approach to testing the integrity of all cybersecurity layers, combining continuous coverage and risk prioritization for effective mitigation of security gaps.
This approach provides a true view of current security exposures by emulating real-life attacks, enabling an impact-based remediation plan rather than chasing thousands of vulnerabilities.
Security teams can know exactly where they stand and confidently strive towards maximum security readiness.
When evaluating security validation platforms make sure to check these boxes:
The question that needs answering is whether you know your organisation’s true security risk at any given time. Do you know where the organisation’s weakest links are so they can be remediated or mitigated before an attacker leverages them towards an attack.
If you’re ready to validate your organisation against the latest threats including ransomware strains and Log4Shell vulnerabilities, request your free security health check today.
Ivanti Ground Zero On January 10, 2024, Ivanti disclosed two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, impacting its Ivanti Connect Secure and Ivanti Policy Secure products in supported versions (9.x and 22.x). Successful exploitation can result in authentication bypass and command injection, leading to unauthenticated remote code execution and lateral movement inside the victim’s network. Then on […]
WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a valuable tool for attackers, who can exploit it to access and influence a wide range of organizational applications. In this blog post, we explore how to install a persistent backdoor on WebLogic Server. We […]
Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal Red Teams or unlimited security resources to stay on top of the latest threats. On […]