Problems with outmoded approaches
Many costly breaches happen because of the gaps in vulnerability management we’ve already touched on. When hackers broke into Target’s network in 2013, it was due to network credentials stolen from a third-party vendor resulting in the exposure of 40 million credit and debit card accounts. More recently, hackers targeted U.S. water utility and wastewater treatment systems by exploiting a vulnerability in programmable logic controllers, a type of operational technology system.
According to Verizon, use of exposures as an initial point of entry nearly tripled from 2023 to 2024, accounting for 14% of all breaches and driven by more attacks targeting unpatched, zero-day exposures.
The same research found that 95% of IT and Security professionals think AI will make security threats more dangerous. Yet nearly one in three have no strategy in place to address the risks presented by generative AI.
Still, many in corporate management aren’t aware of how vulnerable their organizations are. Research by Ivanti found 55% of IT and Security professionals feel non‑IT leaders don’t understand vulnerability management, and 47% of those leaders agreed.
And nearly two in three organizations surveyed are not yet investing in critical areas like external attack surface management (EASM). EASM is crucial for effective exposure management because it involves continuously discovering, assessing and prioritizing exposures, providing the visibility needed to protect against cyberattacks. By identifying and assessing internet-facing assets, EASM helps an organization comprehend its exposure landscape. For instance, EASM tools can uncover shadow IT applications and devices operating outside a security perimeter, creating possible attack vectors, or reveal exposures among third-party vendors and suppliers.