vulnerability scans

I have a friend who manages a large financial investment company based in NJ and each year, sometimes twice a year, he brings in a team of pen testers to run a test and check the box for security regulations.When I told him that my company automated pen testing (PT) in software for corporations to run at will, he said, “We already do regular vulnerability assessment (VA) scans; why would I need to do the same with PT? And it’s so expensive!”

Firstly, I told him, when you receive the list of vulnerabilities from the VA report, what do you do with it? VA identifies thousands of vulnerabilities. It does not tell you the potential impact of those in terms of breaches in your particular environment, and does not show you the hacker’s “attack vector” that weaves vulnerability exploits like beads on a fuze string to create a disastrous attack vector.

And when it comes to cost, I added, when PT is done by software and doesn’t require expense expert hour billing, you’re in a completely different ball game of economics. The cost of another pentest run is marginal.

My friend’s eyes widened and he confessed to the reality that vulnerabilities are discovered at a pace much higher than the pace of remediation and that even maintaining the critical updates of the primary components in their network does not make his sleep sound at night.

“You got my attention, so how does your software work?” he asked.

I explained that pentesting in its essence is a multi-step approach in which each vulnerability is attempted until you get to the achievement — stealing info, encrypting info or disrupting applications/services. Pen testing takes the vulnerability (CVSS) scoring system to the next level by determining the most critical attack vectors. This leads to threat-based prioritization that is contextualized to the tested environment. At the end of the day in order to protect your company’s “crown jewels” and focus your cybersecurity resources on remediation, it’s crucial to know the cyber-path of the potential “burglars”.

My friend said, “To tell you the truth, you had me at ‘automated’ in your automated pentesting pitch. I’ll go for a quick test run to see if my team likes the solution.”

If you’d like to try automated PT for your own company, click here to start your journey cyber resilience yellow brick road.


By Arik Liberzon, Founder of Pcysys,  The Automated Pentesting Platform Startup

Written by: Arik Liberzon
Show all articles by Arik Liberzon
Learn more about automated security validation
Resource center
Get blog updates via email
Trending
Ivanti Zero-Day Vulnerabilities: Understand Your Impact
Ivanti Zero-Day Vulnerabilities: Understand Your Impact

Ivanti Ground Zero On January 10, 2024, Ivanti disclosed two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, impacting its Ivanti Connect Secure and Ivanti Policy Secure products in supported versions (9.x and 22.x). Successful exploitation can result in authentication bypass and command injection, leading to unauthenticated remote code execution and lateral movement inside the victim’s network. Then on […]

How to attack and protect WebLogic server
How to attack and protect WebLogic server

WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a valuable tool for attackers, who can exploit it to access and influence a wide range of organizational applications. In this blog post, we explore how to install a persistent backdoor on WebLogic Server. We […]

Why cyber defenders should embrace a hacker mindset
Why cyber defenders should embrace a hacker mindset

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal Red Teams or unlimited security resources to stay on top of the latest threats. On […]

Learn more about our platform
Platform