The report found that the external attack surface is increasingly vulnerable and prone to exploitation by adversaries . For this reason , CISOs should understand that attackers may be continuously scanning their organization ' s attack surface with automated tools before launching cyberattacks . Therefore , organizations should strive to safeguard Internet-facing assets and reduce their attack surface , thus increasing the work and resources needed by cyber adversaries .
" The findings from this report raise troubling concerns about the state of asset vulnerability management ," said Erkang Zheng , Founder and CEO of JupiterOne .
" This survey points out the need to gain deeper insights into asset exploitability which can pose devastating risks to businesses ."
Overall , the report suggests that security asset management programs are too often informal , disorganized and immature . It suggests that organizations would benefit from adopting greater integration technologies , advanced analytics and process automation , according to ESG . The survey exposed many dangerous vulnerabilities , as nearly one-third of respondents ( 31 %) said they discovered sensitive data in previously unknown locations and
30 % found websites with a path to their organizations . In addition , 29 % uncovered employee corporate credentials or misconfigured user permissions , while 28 % exposed previously unknown SaaS applications .
Perhaps most troubling is the fact that 69 % of organizations admitted they had experienced at least one cyberattack that started through the exploit of an unknown or unmanaged Internet-facing asset , including software , cloud-based workloads , user accounts and IoT devices .
As a result of these threats , the survey found that 80 % of organizations plan to increase spending for security hygiene and posture management within the next 18 months . The top budget priorities include data security tools ( 31 %); cyber-risk quantification tools ( 30 %) and cloud security posture management ( 28 %). p
The report found that the external attack surface is increasingly vulnerable and prone to exploitation by adversaries .
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 29