Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      The satellite broadband operators taking on Starlink

      9 July 2025

      Yaccarino out: Musk’s handpicked CEO quits X suddenly

      9 July 2025

      AI gold rush propels Nvidia to record $4-trillion market cap

      9 July 2025

      Price hike for .za domains

      9 July 2025

      China’s Temu ups ante with South African warehouse launch

      9 July 2025
    • World

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025

      Grammarly acquires e-mail start-up Superhuman

      1 July 2025

      Apple considers ditching its own AI in Siri overhaul

      1 July 2025

      Jony Ive’s first AI gadget could be … a pen

      30 June 2025

      Bumper orders for Xiaomi’s YU7 SUV heighten threat to Tesla

      27 June 2025
    • In-depth

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025
    • TCS

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025

      TCS+ | First Distribution on the latest and greatest cloud technologies

      27 June 2025

      TCS+ | First Distribution on data governance in hybrid cloud environments

      27 June 2025
    • Opinion

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Hiding in plain sight – when vulnerabilities aren’t all equal

    Hiding in plain sight – when vulnerabilities aren’t all equal

    Promoted | Organisations to seek a balanced approach that avoids wasting resources and leaving key areas exposed.
    By Skybox Security23 February 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Cybersecurity professionals are overwhelmed by the volume and complexity of vulnerabilities they must protect against. The solution is to mitigate the risk where it matters most through prioritisation and continuous exposure management.

    This is according to security expert Kris Budnik, founder and director of Tilt Advisory, which specialises in helping organisations make more efficient use of technology solutions such as Skybox continuous exposure management tools.

    “There are millions of vulnerabilities. Even a mid-sized organisation will face tens of thousands of vulnerabilities. It’s immediately overwhelming. It is important to be able to put context around the vulnerabilities – what assets they are on, how critical the vulnerabilities are and what risks these exposures present to the business,” Budnik said.

    There is a temptation by the risk-averse to want to protect everything all the time – but this is unrealistic

    However, achieving this perspective isn’t a simple matter when the organisation is dealing with tens of thousands of weaknesses, doesn’t know what it should be protecting and rates every vulnerability based on a worst-case scenario.

    “There is a temptation by the risk-averse to want to protect everything all the time – but this is unrealistic. Vulnerabilities are infinite but resources aren’t, so those two will never meet. Spending too heavily trying to mitigate all risk and address all worst-case scenarios can be as damaging for the organisation as ignorance and failing to mitigate risk,” he said.

    Balancing the portfolio

    Budnik advises organisations to seek a balanced portfolio that avoids wasting resources and leaving key areas exposed.

    “Having context and a good understanding of the environment is key to balancing the portfolio and spending finite resources where they are most needed,” he said. “You want to be as safe as you can afford to be.

    Solutions like Skybox bring intelligence and support decision-making when addressing top exposures

    “Making balanced decisions without contextual information becomes reactive to the most recent threat or the loudest voice – like their latest external audits. Organisations need to avoid being driven to action by a party that also doesn’t understand the context, threats and risks to the environment.”

    Another challenge is that security professionals rarely come from a business background, he said. “Mostly they come from the tech space and often lack curiosity around the business. Generally, I find this leads to a lack of understanding of what they are trying to protect. It may be glossed over or buried in generalisations such as ‘we must protect data or servers’. This is too vague. You need to ensure that you protect a particular process that enables the business to meet its goals.”

    Context and prioritisation

    Budnik says solutions that support asset scoping and prioritisation, as well as vulnerability discovery and prioritisation, help organisations understand how much is enough; and to stop when their security is good enough.

    “Solutions like Skybox bring intelligence and support decision-making when addressing top exposures,” he says.

    He notes that while these advanced technologies support organisations, security and business teams will still need to identify which assets are critical and how they interact with each other to understand the context around the impact of potential exposure.

    Budnik adds that organisations do not need to wait until all preparatory work has been done before deploying solutions to support threat exposure management. “You don’t need to wait for everything to have been done perfectly before harnessing it. These solutions learn and improve iteratively, so nothing stops you from adding context and information over time and improving its performance. You don’t need to wait until all your ducks are in a row before you make the move.

    “There is an out-of-the-box value in deploying technology like this – and often that’s where it stays. However, organisations planning to deploy such technologies should bake into the process the ability to unlock their full potential – not just the out-of-the-box value,” said Budnik.

    “There are tools to support discovery of assets, but there’s no avoiding the effort you must put in to understand what you are protecting,” he says. “To unlock the potential of the technology, it also needs to be informed of the context, so that whatever rules it applies are done in the context of the information you provided. The technology assumes you know your environment and have done the preparation.

    “You also need to teach the system to give you less noise: the more sharply defined the questions are, the more pointed the answers will be and the better protection value you will get,” he said.

    You can download the Skybox security vulnerability solutions buyer’s guide here.

    E-mail [email protected] for more information about Skybox Security.

    • Read more articles by Skybox Security on TechCentral or visit Skybox Security’s TechCentral Hub
    • This promoted content was paid for by the party concerned


    Kris Budnik Skybox Skybox Security Tilt Advisory
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleAndrew Mthembu named interim CEO of EOH
    Next Article Nvidia valuation soars R5-trillion in a single day

    Related Posts

    4 tips for exposure management of your business applications

    19 February 2025

    Network professionals lose nearly half their week to manual tasks that could be automated

    3 December 2024

    Skybox: half of firms fear security incidents due to siloed network and security teams

    17 October 2024
    Add A Comment

    Comments are closed.

    Company News

    Samsung unfolds the future with thinnest, lightest Galaxy Z Fold yet

    9 July 2025

    Huawei supercharges South African SMEs with over 20 new eKit products

    9 July 2025

    Webtonic cracks the talent code with AWS-powered TonicHub

    9 July 2025
    Opinion

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.