Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Telecoms industry backs Malatsi policy directive, warns on execution - ACT CEO Nomvuyiso Batyi

      Telecoms industry backs Malatsi policy directive, warns on execution

      17 December 2025
      TechCentral's International Newsmakers of 2025

      TechCentral’s International Newsmakers of 2025

      17 December 2025
      Warner Bros slams the door on Paramount

      Warner Bros slams the door on Paramount

      17 December 2025
      Airtel to roll out Starlink direct-to-cell across Africa

      Airtel to roll out Starlink direct-to-cell across Africa

      17 December 2025
      Presidency backs Solly Malatsi in BEE reform fight - Cyril Ramaphosa

      Presidency backs Solly Malatsi in BEE reform fight

      15 December 2025
    • World
      X moves to block bid to revive Twitter brand

      X moves to block bid to revive Twitter brand

      17 December 2025
      Oracle’s AI ambitions face scrutiny on earnings miss

      Oracle’s AI ambitions face scrutiny on earnings miss

      11 December 2025
      China will get Nvidia H200 chips - but not without paying Washington first

      China will get Nvidia H200 chips – but not without paying Washington first

      9 December 2025
      IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

      IBM reportedly close to $11-billion deal to buy Confluent

      8 December 2025
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
    • In-depth
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      Canal+ plays hardball - and DStv viewers feel the pain

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Prevention is better than cure: how CEM helps deal with cyberrisk

    Prevention is better than cure: how CEM helps deal with cyberrisk

    Promoted | Continuous Exposure Management (CEM) helps organisations proactively manage, prioritise and mitigate ever-changing risks, says Skybox Security.
    By Skybox Security19 October 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    In the realm of cyberrisk, the vulnerability landscape is vast. Skybox’s 2023 Vulnerability and Threat Trends Report noted over a staggering 25 000 new vulnerabilities and exposures recorded last year alone, marking a 25% year jump from the previous year. This increase happens while security teams often have to deal with reduced budgets and resources.

    Read: Vulnerability and Threat Trends Report 2023

    While human attack vectors are a significant concern, it’s important to note that more than 40% of breaches are still occurring through software supply chain and 38% of attacks are via third-party access, while 46% are through web applications, as reported in the PwC 2023 Digital Trust Insights Report. Backdoor attacks and “living off the land” approaches are becoming more common, making it even harder for IT security to stay on top of threats.

    So, what exactly is cyber exposure management? Think of it as applying sunscreen only to visible areas, like your arms or areas within easy reach. However, the real damage is only found when you realise that sunburn is usually to exposed skin that lies in less obvious places, like behind your knees or ears, where it’s been exposed to harsh UV rays while you focus on the visible areas. Full coverage is essential to prevent an uncomfortable night ahead!

    Image: Skybox Security

    Traditional approaches to handling vulnerabilities and patches are no longer enough due to the sheer volume and rapid evolution of vulnerabilities. Cybersecurity risks extend beyond software vulnerabilities, encompassing device misconfigurations, overlooked services, overly permissive filtering rules and more. The term “exposure” covers a broader spectrum of risks, urging security teams to reconsider traditional vulnerability management methods.

    Just like the sunscreen analogy, addressing the challenge of organisational cyberrisks based solely on what a tool reports or what can be seen from one dimension lacks valuable insights and won’t prevent the unseen patch of skin from being scorched – such as that forgotten unmanaged development server that is internet-facing and stores critical financial data.

    Organisations will continue to face gaps in effectively managing risks and threats when they have not implemented a continuous exposure-based approach, primarily because their existing security controls are siloed and tool-centric. These tools can only do so much. For example, firewalls may successfully filter traffic, but what about firewalls with overly permissive rules?

    Organisations must adopt a comprehensive and proactive approach to risk mitigation

    Additionally, many organisations have rigid compliance programmes in which they audit areas like firewalls and network segmentation and carry out penetration testing at intervals. But even these measures sample only selected areas of the network and indicate the level of risk at a single point in time. This would be akin to applying sunscreen once and going for a swim straight after and never reapplying the cover.

    Scheduled audits and pentests often neglect areas considered irrelevant, such as the laptop that hasn’t been patched for the year, or the server that’s just a sandbox, but is in fact exposed to the internet from where attackers could access the network. The attack surface evolves continuously, necessitating ongoing exposure management. Organisations must maintain an up-to-date, real-time view of their environment – with all the data normalised to help them gain insights and act on prioritised risks and be able to rapidly respond to vulnerabilities that pose an imminent and high risk.

    Skybox CEM

    Given the catastrophic impact of cyberattacks, organisations must adopt a comprehensive and proactive approach to risk mitigation. They need to continuously adapt as their exposure changes. Recognising this need, Skybox introduced a method to extend the scope of typical vulnerability management through a continuous exposure management (CEM) programme.

    Through CEM, Skybox supports every aspect of an organisation’s continuous exposure management programme, enabling security teams to map their attack surface, contextualise data, evaluate and prioritise vulnerabilities, and respond effectively through remediation.

    Image: Skybox Security

    Skybox integrates with over 150 technologies to create a dynamic security model, mapping the attack surface and contextualising security data from various sources like network platforms, asset databases, security tools, vulnerability scanners, intelligence feeds and remediation systems. This aggregation of data offers a 360-degree view of the attack surface, delivering a thorough understanding of asset information, vulnerability and threat data, security controls and policies.

    Through vulnerability prioritisation, we assess the exposure, exploitability and context of the asset to determine the severity of the risk. Not all risks represent the same danger for an organisation, therefore prioritisation looks at where the assets and data are in the network, how critical they are for the business, and what security controls are in place to protect them.

    With Skybox CEM, organisations gain the full visibility necessary to understand the consequences of making changes or modifications to their infrastructure such as integrating a new branch, merging with another company, installing new applications, or migrating to the cloud. Armed with this understanding, they can ensure that security policies remain compliant and that teams are effectively reducing exposure to risks.

    Attack simulations

    This visibility also enables teams to run attack simulations to understand how they are exposed, the potential impact of this, and how they could contain the incident as attackers move laterally through the network.

    Importantly, the Skybox CEM platform enables organisations to quantify both technical risk and the risk to business processes and revenues. It becomes possible to determine the costs per time frame if the business loses a particular system or application.

    By prioritising and quantifying the risks, CEM enables IT security teams to address the most critical vulnerabilities first and prevent attacks before they happen – where it matters most.

    • The authors are Simone Santana, Africa regional director, and Jose Bernal, Emea sales engineering director, both at Skybox Security
    • Read more articles by Skybox Security on TechCentral
    • This promoted content was paid for by the party concerned


    CEM continous exposure management Simone Santana Skybox Skybox Security
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBlueSky, Salesforce: elevate your customer experiences with AI
    Next Article Huawei shows how sub-3GHz 5G will unleash Africa’s digital potential  

    Related Posts

    Weak passwords cause one in five breaches - Solid8 and Specops have the fix

    Weak passwords cause one in five breaches – Solid8 and Specops have the fix

    22 October 2025
    Trust in automation: Solid8 and AlgoSec power Africa's secure digital future

    Trust in automation: Solid8 and AlgoSec power Africa’s secure digital future

    21 October 2025
    4 tips for exposure management of your business applications - Skybox Security

    4 tips for exposure management of your business applications

    19 February 2025
    Add A Comment

    Comments are closed.

    Company News
    Why TechCentral is the most powerful platform for reaching IT decision makers

    Why TechCentral is the most powerful platform for reaching IT decision makers

    17 December 2025
    Business trends to watch in 2026 - Domains.co.za

    Business trends to watch in 2026

    17 December 2025
    MTN Zambia launches world's first 4G cloud smartphone solution - Huawei

    MTN Zambia launches world’s first 4G cloud smartphone solution

    17 December 2025
    Opinion
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Telecoms industry backs Malatsi policy directive, warns on execution - ACT CEO Nomvuyiso Batyi

    Telecoms industry backs Malatsi policy directive, warns on execution

    17 December 2025
    TechCentral's International Newsmakers of 2025

    TechCentral’s International Newsmakers of 2025

    17 December 2025
    Warner Bros slams the door on Paramount

    Warner Bros slams the door on Paramount

    17 December 2025
    Why TechCentral is the most powerful platform for reaching IT decision makers

    Why TechCentral is the most powerful platform for reaching IT decision makers

    17 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}