Tenable research explored the lifecycle of exploits from discovery to utilization in a breach. What we learned will help you better protect your organization through a risk based approach to vulnerability management.
The nature of cyber attacks has undergone dramatic changes in the past few years. You need to ensure that your approach to protecting your organization from attacks reflects these changes through defense mechanisms that reflect the rise of cyber crime and the infrastructure that supports it.
- A risk based approach to vulnerability management that prioritizes those vulnerabilities most likely to be utilized in an attack is necessary given the overwhelming number of vulnerabilities.
- The cybercrime supply chain is quite sophisticated. This allows attackers to operate at arms length, complicating law enforcement efforts.
- There is an imbalance between the amount of resources that threat groups are expending on cybercrime versus the more limited resources of defenders.
- Different exploits command different prices. Some command prices as high as $1M.