AN INCONVENIENT TRUTH FACED BY ENTERPRISES TODAY IS THAT THE GROWTH OF CYBER-ATTACKS ISN’T SLOWING DOWN AND HACKERS ARE CONSTANTLY FINDING NEW WAYS TO EXPLOIT WEAKNESSES IN IT ENVIRONMENTS. EXPERTS SHARE INSIGHT ON WHY VULNERABILITY MANAGEMENT IS A VITAL PROCESS IN STRENGTHENING AN ORGANISATION’S SECURITY POSTURE.
Major cybersecurity breaches that took place across the globe highlight how crucial vulnerability management is for any organization.
WannaCry, NotPetya, the Equifax breach, and other well-publicized cyber-attacks took advantage of vulnerabilities that could have been easily patched and secured.
Vulnerabilities are like holes in a suit of armor - while they do not instantly pose a problem, it’s only a matter of time before they do. Global enterprises have an average of between 18 million and 24 million vulnerabilities across 60,000 assets, according to a study by Cynthia.
However, as vulnerabilities alone are not active threats, it becomes a big challenge for organizations to pinpoint what needs to be addressed and prioritized. More often than not, organizations face a plethora of vulnerabilities at any given time. Almost anything can become a vulnerability and a liability to network security such as unpatched operating systems, programmes running old software versions as well as siloed applications plugged into a new network. In addition, attackers may exploit “holes in the armor” that are unknown.
An effective vulnerability management programme starts with giving your organization the tools needed to understand its security weaknesses, assess the risks associated with those weaknesses, and put protections in place to prevent a breach.
To be truly effective amid the growing number and sophistication of threats, enterprises are increasingly adopting new ways to address security vulnerabilities.
“Traditional vulnerability technologies that perform a scan and report, are obsolete by current standards,” says Morey Haber, CTO, BeyondTrust. “These solutions often only present a snapshot in time that does not cover runtime vulnerabilities and intermittent changes that can create transient vulnerabilities; especially in the cloud.”
Diese Geschichte stammt aus der February 2019-Ausgabe von Security Advisor Middle East.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der February 2019-Ausgabe von Security Advisor Middle East.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
KASPERSKY SHEDS LIGHT ON THE RANSOMWARE ECOSYSTEM
Ransomware is on the tip of everyone’s tongue every time businesses discuss cyber threats they are likely to face in 2021.
GAJSHIELD: ENABLING CONTEXTUAL VISIBILITY FOR OPTIMUM DATA PROTECTION
HARRISON ALBERT, REGIONAL DIRECTOR, D-LINK MIDDLE EAST AND AFRICA, TELLS SECURITY ADVISOR MIDDLE EAST HOW GAJSHIELD’S CONTEXT-BASED APPROACH TO SECURITY HELPS ORGANISATIONS FIND ANOMALIES, REDUCE FALSE ALARM AND PREVENT INTENTIONAL & UNINTENTIONAL DATA EXPLOITATION.
THALES ANNOUNCES NEW SOLUTIONS TO HELP OGANISATIONS DISCOVER, PROTECT AND CONTROL SENSITIVE DATA IN MULTICLOUD ENVIRONMENTS
THALES HAS ANNOUNCED NEW DATA PROTECTION SOLUTIONS FOR GOOGLE CLOUD, MICROSOFT AZURE, AND AMAZON WEB SERVICES, SOLIDIFYING ITS ROLE AS A TRUSTED THIRD PARTY FOR MULTI-CLOUD DATA SECURITY.
RANSOMWARE RECOVERY COST FOR UAE IN 2021 IS $517,961: SOPHOS SURVEY
THE SURVEY POLLED 5,400 IT DECISION MAKERS IN MID-SIZED ORGANISATIONS IN 30 COUNTRIES ACROSS EUROPE, THE AMERICAS, ASIA-PACIFIC & CENTRAL ASIA, THE MIDDLE EAST, AND AFRICA.
OVERCOMING THE CYBER-PANDEMIC
ABHIJIT MAHADIK, DIRECTOR, CYBERSECURITY & INFRASTRUCTURE – UAE & KSA, RAQMIYAT SPEAKS TO SAME ABOUT THE EVOLVING CYBERSECURITY LANDSCAPE, THE THREATS ORGANISATIONS NEED TO WATCH OUT FOR AND HOW THE SECURITY PRIORITIES OF ORGANISATIONS HAVE SHIFTED SINCE THE PANDEMIC LAST YEAR.
FORTINET: MAKING A MARK @ GISEC
ALAIN PENEL, REGIONAL VICE-PRESIDENT, MIDDLE EAST & PAKISTAN AT FORTINET, EXPLAINS WHAT IT MEANS TO BE A PART OF GISEC THIS YEAR AND HOW FORTINET’S CUTTING-EDGE SOLUTIONS CONTINUE TO PROVIDE MAXIMUM PROTECTION AGAINST CYBERTHREATS AND ATTACKS.
ANATOMY OF AN OT ATTACK
MAHER JADALLAH, SENIOR DIRECTOR - MIDDLE EAST & NORTH AFRICA AT TENABLE, DISCUSSES HOW, INSTEAD OF DEFENDING AGAINST AN ATTACK IN PROGRESS, A MORE SUSTAINABLE APPROACH WOULD BE ONE OF PREVENTION – OF ORGANISATIONS DOING A BETTER JOB OF UNDERSTANDING THEIR SYSTEMS, WHERE AND HOW THOSE SYSTEMS MAY BE EXPOSED, AND PRIORITISING THE THINGS THEY NEED TO PROTECT THESE SYSTEMS.
MICRO FOCUS: OFFERING DRAMA-FREE IT WITH OPTIC
TOUFIC DERBASS, MANAGING DIRECTOR MICRO FOCUS MIDDLE EAST & AFRICA, DISCUSSES HOW THE LATEST IT PLATFORM FROM MICRO FOCUS OFFERS UNIFIED INTERFACE AND & EXPANDED INTEGRATION CAPABILITIES.
COPING WITH THE NEW NORMAL
HUSNI HAMMOUD, MANAGING DIRECTOR - ESET ME, BARRACUDA NETWORKS, IVANTI (PART OF MIDIS GROUP), TELLS SECURITY ADVISOR HOW THE CHALLENGES OF THE LAST ONE YEAR HAVE CHANGED THE BUSINESS LANDSCAPE AND HOW ORGANISATIONS ARE NAVIGATING NEW TRENDS.
AN IN-DEPTH DEFENCE STRATEGY
WERNO GEVERS, REGIONAL MANAGER, MIMECAST MIDDLE EAST, DISCUSSES HOW WHEN IT COMES TO EMAIL SECURITY, IT IS NECESSARY FOR SECURITY PROFESSIONALS TO EVOLVE FROM A PERIMETER-BASED DISCIPLINE TO A MORE PERVASIVE ONE.