• Advertising
  • Disclaimer
  • Copy Right
  • Contact us
  • About us
WTM News
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
WTM News
No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos
Home Technology

Manage vulnerabilities in the face of increased attacks

News writer by News writer
March 11, 2022
in Technology
7 0
A A
0
Perímetro de seguridad Así se implementan políticas de seguridad centradas en los datos auditoría de ciberseguridad seguridad en linux SOC gestionar las vulnerabilidades

Manage vulnerabilities in the face of increased attacks

153
SHARES
236
VIEWS
Share on FacebookShare on Twitter

[ad_1]

Security perimeter This is how data-centric security policies are implemented cybersecurity audit linux security SOC manage vulnerabilities

Managing vulnerabilities and threats has never been more difficult. Today, with the widespread decentralization of the workplace, access to information and corporate resources from any device and from anywhere, it is no longer enough to simply scan and patch the multiple vulnerabilities that are continually emerging in this environment. It is impossible to keep up with such a frenetic pace.

To effectively minimize their own attack surface, predict potential threat scenarios in advance, and manage their patches and vulnerabilities, companies will need to resort to risk-based scanning procedures.

But neither compliance-oriented vulnerability management nor patch management are able to keep up with the pace and aggressiveness of attacks. Unfortunately, it is still common practice for IT teams to close vulnerabilities solely based on the severity level defined by the software provider. This alone is not enough, and in many cases it does not reflect the real risk that a vulnerability represents for our company.

Currently, it happens that when a vulnerability potentially classified as risk is made public, it is already being actively exploited, so it is essential to take into account other risk parameters to correct them.

Therefore, a prioritization of vulnerabilities that incorporates risk-based factors offers a significantly higher level of protection, but also requires an entirely new model.

‘Risk-based’ vulnerability management model closes security gaps

The correct approach is to identify, prioritize and mitigate all vulnerabilities related to the criticality of the company’s systems. This risk-based prioritization focuses Informatic security across a wide range of parameters, rather than focusing on the severity of a provider as the sole criterion. This primarily includes data centers where the highest risks to an environment are classified, such as vulnerabilities being exploited for attacks.

Furthermore, observing and analyzing trends among threat actors help set priorities for detection. Thus, to ensure rapid removal of the most dangerous threats, it is important to become familiar with current and past attack patterns. For example, in recent years, 95% of the time, cybercriminals have used remote code execution and privilege escalation to inject a malicious code or extract data. Also part of this security approach is the precise analysis of the context of an attack; In this sense, discussions in forums or on the dark web offer interesting clues.

Expert prioritization that incorporates these types of risk-based factors offers a significantly higher level of protection, but it also requires a radically new approach: it is an effective process of collecting and integrating information about relevant threats, encompassing a ecosystem of different information sources that are intelligently aggregated. This also includes the results of penetration tests or regular vulnerability scans and, as a next step, it is decided which vulnerabilities should be scanned first. This approach tends to increase the workload for IT security, even though specialized tools provide this type of data, as it is often already integrated into automated patching routines.

Analyze threat data in a structured way

Until now, it was barely possible to compare vulnerability information between infrastructures and applications, since applications often use Common Vulnerabilities and Exposures (CVE) or Common Weakness Enumerations (CWE) as the basis of data. Service providers such as Ivanti RiskSense solve this problem by developing advanced index scores, which are significantly more meaningful than the simple CVSS v3 score. To determine this cybersecurity score, the various data are normalized and the impact of a vulnerability is merged with the context of the threat and the current exploits, in order to estimate the probability of being exploited. An algorithm is used that intelligently filters and highlights the most risky vulnerabilities. To do this, it takes into account vulnerability and threat data, as well as human validation of exploits by penetration testing teams. Cybersecurity risks are thus deciphered from the broadest possible perspective. In this way, the criticality is evaluated at the moment a vulnerability is found, and at all times it is known how it is exploited.

Building a bridge to patch management

But it is not enough to know the trouble spots. The next step is to incorporate the findings from the vulnerability risk analysis into patch management. This allows IT teams to have an overview of the patches that need to be applied immediately. The rule of thumb is as follows: vulnerabilities in highly critical systems should be remediated on a priority basis, which means that currently unexploited security holes with lower risk potential can remain open.

Beyond “silo” thinking

A risk-based security model requires more than ever that security and IT operations communicate with each other. However, in many organizations, one team is responsible for vulnerability scanning and penetration testing, another team is responsible for setting priorities, and the IT team for remediation. As a result, there are sometimes serious gaps or too much time lag between security findings and IT remediation. Also, the IT department rarely has visibility into the results of their efforts. When IT and security share responsibility and work together to address cyber risks, remediation is much more successful and increasingly effective.

Conclution

In the past, cyber risk management focused primarily on the number of patches applied, a model that is no longer useful. Accurate measurement of risk exposure requires a qualitative assessment adapted to the systems of each organization. To do this, an effective TVM*1 solution must have the ability to display results that are understandable to both IT and security teams as well as the executive level of the company, without the need for interpretation.

On the other hand, establishing a cybersecurity priority score for vulnerability management in an organization allows the effectiveness of the risk-based approach to be measured. This simplifies planning and eliminates the need to use purely activity-based metrics to address vulnerabilities.

Likewise, it allows security teams to run what-if scenarios that give an idea of ​​the actions that will have a positive impact and how they can be aligned with the available resources and the sensitivities of the business. The bottom line is that threat and vulnerability management coverage must keep pace with business dynamics. Therefore, it is critical to evolve from one-off compliance-based assessments to those that are more time-sensitive and require a sense of urgency, due to the high potential risk they pose to an organization.

support tools

Managing a vulnerability requires a huge amount of data, something that can fluctuate depending on the type of scanner and the type of provider. To make sense of such a level of complexity, it is ultimately necessary to establish a common prioritization based on threats, which includes all assets. The selection of the appropriate tools can contribute to this, mainly because they allow attacks to be predicted. They should include the following features:

CVS´s reference evaluation

Industry standard threat data sources, such as the National Vulnerability. Vulnerability Database (NVD), Common Vulnerabilities and Exposures (CVE). Common Weakness Enumeration (CWE) and the OWASP Top 10. Selected threat sources, providing extensive coverage and updates on the most active exploits

Direct input from the industry’s leading penetration testing teams on new validated exploits

Daniel Gonzalez. Senior Key Account Manager. Ivanti

[ad_2]

Quellenlink : revistabyte.es

Tags: AttacksfaceincreasedManagevulnerabilities
Previous Post

Review of ‘Official Competition’

Next Post

Summit in Versailles: Europe initiates a rearmament in the face of the Russian challenge in Ukraine | International

News writer

News writer

I try to find the best news for you and publish it on WTM News. Follow my articles to become an up-to-date person!

Related Posts

profesiones tecnológicas tecnología circular
Technology

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology
Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Roberto Lopez Familia Martínez
Technology

Interview with Roberto López, Corporate CTO Familia Martínez

November 23, 2022
Cloudera Data Platform One
Technology

Cloudera Data Platform One, accessible data analytics

November 22, 2022
Cloud services to solve complex IT problems
Technology

SAP deploys the first public cloud project at Cepsa

November 22, 2022
appian world data fabric
Technology

Appian joins the Low-Code Data Fabric

November 22, 2022
Next Post
Summit in Versailles: Europe initiates a rearmament in the face of the Russian challenge in Ukraine |  International

Summit in Versailles: Europe initiates a rearmament in the face of the Russian challenge in Ukraine | International

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Tesla's new update notifies the driver of tire wear

Tesla’s new update notifies the driver of tire wear

December 16, 2021
'Stranger Things': Jamie Campbell Bower opens up about her secret role for the first time

‘Stranger Things’: Jamie Campbell Bower opens up about her secret role for the first time

May 31, 2022
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

July 25, 2021
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

July 24, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

0
Added the ability to check voice messages before sending to WhatsApp!

Added the ability to check voice messages before sending to WhatsApp!

0
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

0
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

0
At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Latest News

At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Suggest application sites

Weltnachrichten

Nachrichten Star

Dutycope

Freelance sites

Marze Safar

Food Cake

Arabic news

BackPack Travel

Travel Vision

Cooking

Drinks & Foods

WTM News

WTM News is a smart magazine that collects new and important technology news of the world for you from all over the web.
Our goal is to compile the best news so that you can more easily get the latest technology news in the world.

Follow us

News Categories

  • apps
  • business
  • entertainment
  • Environment
  • foods
  • gadget
  • games
  • health
  • lifestyle
  • mobile
  • movies
  • music
  • News
  • Other
  • Review
  • science
  • sports
  • startups
  • Technology
  • travel
  • Videos

Freelancer | Logo design | Hervess | Nachrichten Star | News Pro | Arabic news

Buy sponsor post | Marze Safar | BackPack Travel | Food Cake

How to cook any thinks | Learning how to make cakes and sweets

latest news

Review of the first part of the fifth season of the Money Heist series

The fifth season of Money Heist series

The points given are based solely on the personal taste of
Introduction of Solar Ash game

Solar Ash game

Score against the average score of this game on the site

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist