Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Telkom warns Icasa call rate cuts will punish smaller players

      13 June 2024

      MultiChoice will ride out Nigeria chaos

      13 June 2024

      Showmax reports R2.6-billion in trading losses

      13 June 2024

      Big section of 2Africa subsea cable is now live

      12 June 2024

      MultiChoice sheds 9% of its subscriber base in 12 months

      12 June 2024
    • World

      SpaceX sued by engineers fired after accusing Elon Musk of sexism

      13 June 2024

      Elon Musk withdraws lawsuit against OpenAI

      12 June 2024

      Investors cheer Apple AI strategy

      12 June 2024

      High-fidelity audio is finally coming to Spotify

      11 June 2024

      Musk threatens to ban Apple devices over OpenAI integration

      11 June 2024
    • In-depth

      It’s Jensen’s world now

      6 June 2024

      From Talkomatic to WhatsApp: the incredible history of instant messaging

      28 May 2024

      The 20 most influential tech products of all time

      22 May 2024

      Early signs that AI is fuelling a productivity boom

      21 May 2024

      GPT-4o is a stunning leap forward in AI

      18 May 2024
    • TCS

      TCS+ | Telco or ISP? Tired of load shedding chaos? This is for you

      13 June 2024

      TCS+ | Check Point dissects the complexities of cloud security

      11 June 2024

      TCS | MultiChoice declares war on piracy – the man leading the fight

      10 June 2024

      TCS+ | ESET’s Adrian Stanford: how AI will transform cybersecurity

      10 June 2024

      TCS+ | Pinnacle CEO on how AI is going to transform SA business

      6 June 2024
    • Opinion

      Lessons from healthcare for navigating South Africa’s energy crisis

      12 June 2024

      How to maximise solar panel performance in winter

      11 June 2024

      Corrupt municipalities crushing affordable connectivity in South Africa

      4 June 2024

      Post Office debacle shows ANC is out of ideas

      28 May 2024

      Should the SABC have discretion to reject a political ad?

      19 May 2024
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CallMiner
      • Calybre
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LG Electronics
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paratus
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Vertiv
      • Videri Digital
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Continuous vulnerability management: a ‘must have’ for security leaders

    Continuous vulnerability management: a ‘must have’ for security leaders

    Promoted | Security leaders often feel their teams are merely ticking issues off a long but partial list of problems. Here's why.
    By Skybox Security16 April 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    In cybersecurity, it’s widely known that security gaps create risk, and it’s well established that software and hardware vulnerabilities present an ever-present chink in organisational armour. Furthermore, the rapid transition from legacy on-premises systems to the cloud creates additional fissures.

    Speak with a Skybox Security expert

    For years, the pace and volume of these vulnerabilities have accelerated, driven by everything from geopolitical tensions to remote working. Ironically, this blizzard of individual vulnerabilities has crystallised into a very singular technical question for security leaders: how does one discover, prioritise and remediate vulnerabilities more effectively to reduce risk?

    The old ways of vulnerability management are no longer effective

    As Marc Andreessen predicted, software is eating the world. Nowhere is this more evident than inside large organisations, where operations rely on a dizzying array of applications and services hosted in the cloud, on-prem, and in hybrid, multi-cloud and OT platforms.

    While eating the world, software also chiselled many large holes in security. This is both at a granular level – for example, vulnerable code or hardware, all the way to the underlying infrastructure, where weakness in network policy or configuration presents additional risk.

    Threat actors gain access and move laterally by slipping unseen into organisational cracks

    Unfortunately, as the environment sprawled, it didn’t retain essential security controls. Traditional approaches to vulnerability management became siloed, trapping them in single lanes without full visibility and context. The result? Security leaders often feel their teams are merely ticking issues off a long but partial list of problems.

    The gold standard of remediation is patching. It’s theoretically a simple process, but it’s one that often drags on for months. Uncertain of their impact, known vulnerabilities sit exposed in a holding pattern, waiting to be discovered and then waiting again to be addressed, with organisations hoping they don’t get exploited.

    Without a thorough, risk-based vulnerability management tool working for you, this problem will only grow as digital transformation continues to multiply and scatter technical assets across the estate. Already spread thin, security teams will be further overwhelmed and directionless — a finger stuck in the dam facing an endless treadmill of blind triage.

    Get the VTM Buyer’s Guide to help you choose modern vulnerability management technologies.

    Attackers rely on outdated remediation processes

    As always, an issue for security teams is an opportunity for attackers. Helped by an organisation’s lack of a true understanding of their cyber exposure, threat actors gain access and move laterally by slipping unseen into organisational cracks.

    This is compounded by a lower barrier to entry to becoming an attacker. With the rise of cybercrime-as-a-service and easier access to TTP (tactics, techniques and procedures), breaching security has become more effortless than ever. Attackers don’t need to be well-resourced APT (advanced persistent threat) groups developing exotic zero days to succeed in compromising large organisations.

    Attackers don’t need to be well-resourced APT groups developing exotic zero days

    For this reason, even older, less high-profile common vulnerabilities and exposures have just as much relevance for security teams as celebrity vulnerabilities in today’s headlines. Greater numbers of lower-skilled attackers mean more adversaries taking advantage of low-hanging fruit. However, without a strategy for determining vulnerability impact, organisations have no idea of what is below the radar yet dangerous and what is benign.

    Similarly, while a useful guide for gauging general severity and active exploitation, security leaders are reluctant to put too much faith in CVSS scores. Although the process is improving, scores are solely based on external factors, so they lack valuable organisational context critical to prioritisation.

    The importance of context – cyber risk quantification

    This all highlights the importance of context in getting a true picture of risk. Moving beyond mere visibility to effective action requires understanding one thing: each vulnerability’s impact on your specific environment.

    For this to be possible, controls such as continuous exposure management must have complete visibility of all assets, systems, processes and dependencies in the estate. Only with this can you truly understand the nuanced dance of technology in your environment and how, if attacked, operations and business value will be affected. One person’s innocuous asset could be another’s potential regulatory fine.

    By mapping vulnerability data on top of this, organisations can see where exposure truly lies – uncovering the paths adversaries may use to cause reputational and financial damage. Playing out a multitude of theoretical incidents, security leaders can better score risk so security operations are better prioritised and effective.

    To answer the security leader’s question of whether such initiatives lead to better business outcomes, just ask Equifax. One missed vulnerability and half a billion dollars in fines later will attest to the importance of using context to uncover and prioritise the gaps.

    Learn how Skybox can help you better manage vulnerabilities. Speak with an expert today.

    About Skybox Security
    Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our SaaS-based Exposure Management Platform delivers complete visibility, analytics and automation to quickly map, prioritise and remediate vulnerabilities across your organisation.

    • Read more articles by Skybox Security on TechCentral
    • This promoted content was paid for by the party concerned
    Continuous vulnerability management CVM Skybox Skybox Security VTM
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBloody nose for MultiChoice in sports fight with eMedia
    Next Article Forget eye strain with the Honor Magic6 Pro

    Related Posts

    Telkom warns Icasa call rate cuts will punish smaller players

    13 June 2024

    MultiChoice will ride out Nigeria chaos

    13 June 2024

    TCS+ | Telco or ISP? Tired of load shedding chaos? This is for you

    13 June 2024
    Add A Comment

    Comments are closed.

    Company News

    How to harness customer insights in the age of information overload

    13 June 2024

    How LayUp is advancing lay-by payments in Africa

    12 June 2024

    Recapping an extraordinary month at Next DLP

    12 June 2024
    Opinion

    Lessons from healthcare for navigating South Africa’s energy crisis

    12 June 2024

    How to maximise solar panel performance in winter

    11 June 2024

    Corrupt municipalities crushing affordable connectivity in South Africa

    4 June 2024

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2024 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.