While it’s always the latest zero-day vulnerability or the latest attack technique that grabs the media’s attention, as well as the attention of many technology professionals — these are not the archetypal attack vectors criminals tend to use to infiltrate systems. It’s actually the day-to-day grind against existing and well-known vulnerabilities that typically gets enterprises breached.While that may strike many as grim news, it may be as good as the news gets for enterprise security professionals: as long as organizations focus on keeping their existing systems up to date, they could go quite far in mitigating the risk of attacks and force criminal hackers to work with newer and more sophisticated (read riskier) exploits.That’s not to say that defending systems ever becomes easier. It doesn’t. It does force adversaries to adapt and increase the effort they must put into their attacks if they are to succeed. As Dave Merkel, CEO and co-founder at Expel put it: threats evolve as technology evolves. “As defenders become more adept, their attackers become faster,” says Merkel. That’s why the security operations and vulnerability management challenge is constantly growing, because as enterprises deploy new technologies their attack surface changes and expands. And it’s not just new cloud services and application and application deployments, but also the development and infrastructure environment within the enterprise. “It’s a forever thing. It’s a continued evolution,” explains Merkel.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds