News

Security teams are struggling to remediate vulnerabilities

Enterprise security teams are struggling to go beyond simple detection and aim to effectively respond to and remediate vulnerabilities.

This is the conclusion made by the specialists of the information security company Vulcan Cyber based on the results of a new study on corporate programs for prioritizing and eliminating security threats.

The study found that business leaders and IT managers are limited in their ability to obtain the critical information they need to effectively protect valuable business assets, making vulnerability management programs largely ineffective.

Risk assessment outside the context of the business is useless. Most of the Vulcan Cyber survey participants tend to sort vulnerabilities by infrastructure (64%), business function (53%), and application (53%).

This is a concern because prioritizing risks based on sorting by infrastructure and applications outside of the context of assets does not make sense. Failure to correlate vulnerability data with real business risk leaves organizations unprotected.Vulcan Cyber experts say.

The vast majority of decision makers assess and prioritize vulnerabilities according to two or more models: CVSS Common Vulnerability Scoring System (71%), OWASP Top 10 (59%), Vulnerability Scanner (47%), top -25 CWE (38%) or bespoke models (22%). To ensure meaningful cyber risk management, a customized scoring and prioritization model takes into account multiple industry standards is ideally suited and most effective.

The more control a security team has over the assessment and prioritization of risks, the more effectively they can mitigate them. However, there is still no industry-wide framework for risk-based vulnerability management, which means cyber hygiene is still inadequate and vulnerabilities continue to pose risks.

The majority of survey participants (54%) consider confidential data leakage to be the most serious threat that vulnerabilities in applications can lead to. This is followed by incorrect authentication (44%), incorrect configuration of security mechanisms (39%), insufficient logging and monitoring (35%), and injection (32%).

The greatest concern among survey participants is the CVE-2014-6324 vulnerability in Microsoft Windows. It is noteworthy that it is even more feared than the more dangerous vulnerabilities in Windows SMB, CVE-2019-0708 (BlueKeep), CVE-2014-0160 (Heartbleed) and EternalBlue.

The research was conducted prior to the disclosure of the Log4shell vulnerability in the Log4J logging utility, so it does not appear in the researchers’ report. But we talked about what First ransomware exploiting Log4Shell problem was discovered and that Chinese APTs are interested in Log4Shell vulnerability.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)
Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Remove Vizoaksy pop-up ads (Virus Removal Guide)

Vizoaksy.com is a site that tries to force you into subscribing to its browser notifications…

2 days ago

Remove Keyapp.monster pop-up ads (Virus Removal Guide)

Keyapp.monster is a site that tries to force you into clik to its browser notifications…

2 days ago

Remove Withblaockbr.org pop-up ads (Virus Removal Guide)

Withblaockbr.org is a domain that tries to trick you into subscribing to its browser notifications…

2 days ago

Remove Janorfeb.xyz pop-up ads (Virus Removal Guide)

Janorfeb.xyz is a site that tries to force you into clik to its browser notifications…

3 days ago

Remove Re-captha-version-3-263.buzz pop-up ads (Virus Removal Guide)

Re-captha-version-3-263.buzz is a domain that tries to force you into subscribing to its browser notifications…

3 days ago

Remove Usavserver pop-up ads (Virus Removal Guide)

Usavserver.com is a site that tries to force you into subscribing to its browser notifications…

3 days ago