Brexit: the unintentional evolution of a Black Swan event

Brexit: the unintentional evolution of a Black Swan eventGeary Sikich explains why he believes that Brexit is a Black Swan event and describes various issues that enterprise risk managers should consider when assessing and managing Brexit risks.

Read this article

Replacing FUD with business continuity nudges

Replacing FUD with business continuity nudgesWhen looking to obtain support for business continuity programs the fear, uncertainty and doubt (FUD) approach is at best ineffective, at worst counter-productive. Instead, using nudge theory is more likely to pay dividends. David Honour explores…

Read the article

Emergency evacuations: how to deal with the issue of ‘bystander apathy’

bystander apathyIt has been noted numerous times, in multiple studies, that building occupants often ignore or are slow to respond to standard fire alarm sounders: this is ‘bystander apathy’. This article looks at the issue and suggests some solutions.

Read this article.

Seven misconceptions about DDoS attacks that could jeopardize your business

Rolf GierhardThe DDoS threat landscape has developed rapidly leaving many organizations behind in both their perception of the risks and their actions to protect against them. Rolf Gierhard looks at the most dangerous and pervasive misunderstandings about DDoS attacks…

Read this article

Tenable, Inc., has published its latest Vulnerability Intelligence Report, which provides an overview of real-world current vulnerability trends and insights into how organizations assess and respond to new cyber risks. The research found that enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 vulnerabilities are rated as critical on the common vulnerability scoring system (CVSS) — an industry standard measurement.

The Vulnerability Intelligence Report’s findings confirm that managing vulnerabilities is a challenge of scale, volume and velocity. The Tenable Research team analysed anonymised data from 900,000 vulnerability assessments across 2,100 enterprises. The team estimates that the industry is on track to disclose up to 19,000 new vulnerabilities in 2018, an increase of 27 percent over 2017. Yet in 2017, public exploits were available for seven percent of all vulnerabilities, meaning that 93 percent of all vulnerabilities posed only theoretical risk. For most vulnerabilities, a working exploit is never developed and of those, an even smaller subset is actively weaponised by threat actors, making it difficult to understand which vulnerabilities to remediate first, if at all.

This lack of rigorous prioritisation means that organizations are struggling to assess and manage more vulnerabilities than ever and consequently, they are unable to make strategic technology decisions. For example, Adobe Flash will be unsupported from 2020 onward and is not commonly used in most enterprise environments. Yet Adobe Flash still lingers in enterprise environments and its vulnerabilities  represent half of the 20 most prevalent application vulnerabilities in enterprise environments.

“When everything is urgent, triage fails. As an industry, we need to realise that effective reduction in cyber risk starts with effective prioritisation of issues,” said Tom Parsons, senior director of product management, Tenable. “To keep up with the current volume and velocity of new vulnerabilities, organizations need actionable insight into where their greatest exposures lie; otherwise, remediation is no more than a guessing game. This means organizations need to focus on vulnerabilities that are being actively exploited by threat actors rather than those that could only theoretically be used.”

To address this deluge of vulnerabilities, Tenable has launched ‘Predictive Prioritisation’, an innovation which will provide organizations with the capability to prioritise those vulnerabilities which pose the greatest actual risk to the business. With Predictive Prioritization, Tenable is combining a variety of data sources and threat intelligence with advanced data science algorithms to determine the probability of a vulnerability being leveraged by threat actors. Predictive Prioritisation will be generally available in 2019.