Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Public money, private plans: MPs demand Post Office transparency

      13 June 2025

      Coal to cash: South Africa gets major boost for energy shift

      13 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      10 red flags for Apple investors

      13 June 2025
    • World

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Continuous vulnerability management: a ‘must have’ for security leaders

    Continuous vulnerability management: a ‘must have’ for security leaders

    Promoted | Security leaders often feel their teams are merely ticking issues off a long but partial list of problems. Here's why.
    By Skybox Security16 April 2024
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    In cybersecurity, it’s widely known that security gaps create risk, and it’s well established that software and hardware vulnerabilities present an ever-present chink in organisational armour. Furthermore, the rapid transition from legacy on-premises systems to the cloud creates additional fissures.

    Speak with a Skybox Security expert

    For years, the pace and volume of these vulnerabilities have accelerated, driven by everything from geopolitical tensions to remote working. Ironically, this blizzard of individual vulnerabilities has crystallised into a very singular technical question for security leaders: how does one discover, prioritise and remediate vulnerabilities more effectively to reduce risk?

    The old ways of vulnerability management are no longer effective

    As Marc Andreessen predicted, software is eating the world. Nowhere is this more evident than inside large organisations, where operations rely on a dizzying array of applications and services hosted in the cloud, on-prem, and in hybrid, multi-cloud and OT platforms.

    While eating the world, software also chiselled many large holes in security. This is both at a granular level – for example, vulnerable code or hardware, all the way to the underlying infrastructure, where weakness in network policy or configuration presents additional risk.

    Threat actors gain access and move laterally by slipping unseen into organisational cracks

    Unfortunately, as the environment sprawled, it didn’t retain essential security controls. Traditional approaches to vulnerability management became siloed, trapping them in single lanes without full visibility and context. The result? Security leaders often feel their teams are merely ticking issues off a long but partial list of problems.

    The gold standard of remediation is patching. It’s theoretically a simple process, but it’s one that often drags on for months. Uncertain of their impact, known vulnerabilities sit exposed in a holding pattern, waiting to be discovered and then waiting again to be addressed, with organisations hoping they don’t get exploited.

    Without a thorough, risk-based vulnerability management tool working for you, this problem will only grow as digital transformation continues to multiply and scatter technical assets across the estate. Already spread thin, security teams will be further overwhelmed and directionless — a finger stuck in the dam facing an endless treadmill of blind triage.

    Get the VTM Buyer’s Guide to help you choose modern vulnerability management technologies.

    Attackers rely on outdated remediation processes

    As always, an issue for security teams is an opportunity for attackers. Helped by an organisation’s lack of a true understanding of their cyber exposure, threat actors gain access and move laterally by slipping unseen into organisational cracks.

    This is compounded by a lower barrier to entry to becoming an attacker. With the rise of cybercrime-as-a-service and easier access to TTP (tactics, techniques and procedures), breaching security has become more effortless than ever. Attackers don’t need to be well-resourced APT (advanced persistent threat) groups developing exotic zero days to succeed in compromising large organisations.

    Attackers don’t need to be well-resourced APT groups developing exotic zero days

    For this reason, even older, less high-profile common vulnerabilities and exposures have just as much relevance for security teams as celebrity vulnerabilities in today’s headlines. Greater numbers of lower-skilled attackers mean more adversaries taking advantage of low-hanging fruit. However, without a strategy for determining vulnerability impact, organisations have no idea of what is below the radar yet dangerous and what is benign.

    Similarly, while a useful guide for gauging general severity and active exploitation, security leaders are reluctant to put too much faith in CVSS scores. Although the process is improving, scores are solely based on external factors, so they lack valuable organisational context critical to prioritisation.

    The importance of context – cyber risk quantification

    This all highlights the importance of context in getting a true picture of risk. Moving beyond mere visibility to effective action requires understanding one thing: each vulnerability’s impact on your specific environment.

    For this to be possible, controls such as continuous exposure management must have complete visibility of all assets, systems, processes and dependencies in the estate. Only with this can you truly understand the nuanced dance of technology in your environment and how, if attacked, operations and business value will be affected. One person’s innocuous asset could be another’s potential regulatory fine.

    By mapping vulnerability data on top of this, organisations can see where exposure truly lies – uncovering the paths adversaries may use to cause reputational and financial damage. Playing out a multitude of theoretical incidents, security leaders can better score risk so security operations are better prioritised and effective.

    To answer the security leader’s question of whether such initiatives lead to better business outcomes, just ask Equifax. One missed vulnerability and half a billion dollars in fines later will attest to the importance of using context to uncover and prioritise the gaps.

    Learn how Skybox can help you better manage vulnerabilities. Speak with an expert today.

    About Skybox Security
    Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our SaaS-based Exposure Management Platform delivers complete visibility, analytics and automation to quickly map, prioritise and remediate vulnerabilities across your organisation.

    • Read more articles by Skybox Security on TechCentral
    • This promoted content was paid for by the party concerned


    Continuous vulnerability management CVM Skybox Skybox Security VTM
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleBloody nose for MultiChoice in sports fight with eMedia
    Next Article Forget eye strain with the Honor Magic6 Pro

    Related Posts

    4 tips for exposure management of your business applications

    19 February 2025

    Network professionals lose nearly half their week to manual tasks that could be automated

    3 December 2024

    Skybox: half of firms fear security incidents due to siloed network and security teams

    17 October 2024
    Add A Comment

    Comments are closed.

    Company News

    Huawei Watch Fit 4 Series: smarter sensors, sharper design, stronger performance

    13 June 2025

    Change Logic and BankservAfrica set new benchmark with PayShap roll-out

    13 June 2025

    SAPHILA 2025 – transcending with purpose, connection and AI-powered vision

    13 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.