We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
A combination of better adherence to best practices and use of monitoring programs and new tools in vulnerability and patch management is forcing attackers to change their tactics. Awareness of security and observation of a company’s network is on the rise, decreasing open attack vectors for attackers.
Source: SoftwareReviews Product Scorecard, Accessed May 11, 2020.
However, data pulled from hundreds of penetration tests conducted by Rapid7 have shown that even with improvement, businesses are still failing basic security practices. Patch management, password quality, and a lack of visibility remain common problems for businesses. In 72% of their penetration tests, Rapid7 was able to gather user credentials through standard password spraying. While this is serious, the testers were unable to break the boundary between the external and internal networks. Implementation of network segmentation has prevented these credential losses from becoming an extreme security threat, showing promise for the future of security adherence.
The consensus from the hundreds of penetration tests conducted by Rapid7 is that businesses are slowly getting better at securing their networks, but they can still encounter issues with the basics. Chris Nickerson, CEO at Lares, another penetration testing firm, notes that tooling debt is an overarching problem. Over the years organizations have spent a great deal of money on security tools, adding and discarding them as the business changes. This creates a problem in which organizations will often have multiple poorly integrated tools with no oversight or cohesive strategy.
These continual changes in a program library can be a net negative for the security side of the business, making it hard for consistency and business customization to stay in effect. They can also lead to unpatched security systems, unsupported programs, and open vulnerabilities for the enterprise and can also make it harder to detect alerts from previous penetration tests. A solid vulnerability management suite often comes with programs that include both patch management (a noted issue) and network and inventory assessment tools. These tools can tell you exactly what is on your network, unveiling legacy programs and potential vulnerable entry points.
While businesses are doing better in efforts to secure their networks, there is always room for improvement. Consider your security program against the Rapid7’s list of identified common flaws. Locate where there is room for improvement on best practices and common vulnerabilities to ensure that you’re staying ahead of attackers.
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with the increasingly prevalent role that data privacy plays in cybersecurity.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to ensuring that you don’t inadvertently introduce new risks through this dynamic channel.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.