<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/robert-waters/rss" /><link>https://www.ivanti.com/blog/authors/robert-waters</link><item><guid isPermaLink="false">5bcf2dcd-5cef-4ec8-b3c2-5014ac0aab5d</guid><link>https://www.ivanti.com/blog/risk-appetite</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><title>Understanding Risk Appetite – a Critical Component of Exposure Management</title><description>&lt;p&gt;Risk is inherent in any business. It’s how an organization understands and manages it that makes all the difference.&lt;/p&gt;

&lt;p&gt;From operational challenges to market volatility, regulatory changes and technological advancements, companies face a spectrum of uncertainties that could either generate growth or lead to losses.&lt;/p&gt;

&lt;p&gt;To effectively manage them, a business needs to set out a framework that helps it determine just how much risk it’s willing to accept in pursuit of its objectives. This is where the concept of "risk appetite" comes into play.&lt;/p&gt;

&lt;p&gt;But to define its risk appetite, a company has to see and understand all the risks it faces. And for security teams that are laying the groundwork for their &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt; strategy, defining their organization’s risk appetite is a critical step.&lt;/p&gt;

&lt;h2&gt;What is risk appetite?&lt;/h2&gt;

&lt;p&gt;Risk appetite is the level of risk an organization is willing to accept in pursuit of its objectives. Defining it sets boundaries for the organization regarding what risks it will take and to what degree. A&amp;nbsp;&lt;em&gt;high risk&lt;/em&gt; appetite means being open to accepting greater risks for possibly higher rewards, while a &lt;em&gt;low risk&lt;/em&gt; appetite means the organization prefers reducing risk as much as possible.&lt;/p&gt;

&lt;p&gt;Consider a tech startup that wants to invest in cutting-edge research and development. It may adopt a higher risk appetite to achieve disruptive, breakthrough innovations, knowing that the potential rewards are worth the uncertainty. Conversely, a large, well-established corporation might have a lower risk appetite, focusing on steady growth while avoiding projects that could significantly harm its market position or reputation.&lt;/p&gt;

&lt;h2&gt;Risk appetite is both quantitative and qualitative&lt;/h2&gt;

&lt;p&gt;Risk appetite is never static; it’s a dynamic measure that should be adjusted based on factors such as industry, company size and health, strategic objectives, regulatory requirements and the overall market environment.&lt;/p&gt;

&lt;p&gt;Nor is it just about the numbers: risk appetite is a blend of both quantitative and qualitative factors.&lt;/p&gt;

&lt;p&gt;On one hand, a business may have measurable elements like how much loss it’s willing to tolerate, its debt ratios and what kind of return on investment (ROI) it’s shooting for. It may also have subjective aspects to consider, such as the potential effect on company reputation, ethical considerations and how well its decisions align with its core values.&lt;/p&gt;

&lt;h2&gt;Why is it important to define risk appetite?&lt;/h2&gt;

&lt;p&gt;Nearly any organization that wants to succeed has to take calculated risks. But without a clear understanding of its risk appetite, it can wander into inconsistent, reactive or overly cautious decision-making. That can lead to missed opportunities or business losses. Here's why defining risk appetite is essential:&lt;/p&gt;

&lt;h3&gt;To align strategy and risk management&lt;/h3&gt;

&lt;p&gt;Having a clearly defined risk appetite provides a strategic framework that aligns &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process"&gt;risk management practices&lt;/a&gt; with overall business goals. When an enterprise knows how much risk it is willing to accept, it can pursue opportunities that match its risk appetite while avoiding others that might expose it to undue risk.&lt;/p&gt;

&lt;h3&gt;To improve decision-making&lt;/h3&gt;

&lt;p&gt;Defining risk appetite allows leaders and managers to make informed decisions by clearly understanding what constitutes an acceptable risk. It also sets expectations for both risk-taking and risk-avoidance behaviors across the organization, helping managers evaluate risk/reward trade-offs in different scenarios.&lt;/p&gt;

&lt;h3&gt;To build stakeholder confidence&lt;/h3&gt;

&lt;p&gt;A clearly defined risk appetite reassures investors, regulators, employees and other stakeholders that the organization prioritizes risk management. It also demonstrates a methodical, trustworthy approach to balancing risk against reward, further shoring up stakeholder confidence.&lt;/p&gt;

&lt;h3&gt;To promote consistency&lt;/h3&gt;

&lt;p&gt;When everyone in an organization “gets the memo” on how much risk is permissible, that helps them make consistent decisions because they all understand what's an acceptable gamble. This means there’s less chance of working at cross-purposes or even pulling in opposite directions. For instance, a legal department might put the brakes on a marketing team’s Big Idea if they don’t share the same notion of acceptable risk.&lt;/p&gt;

&lt;h3&gt;To support effective risk monitoring&lt;/h3&gt;

&lt;p&gt;When companies define their risk appetite, they can set up systems to monitor risk levels across the entire enterprise, from finance to operations. Thus, they’re able to spot potential issues early and ensure activities stay within the boundaries of what’s seen as safe — or at least acceptable. Setting and monitoring key risk indicators (KRIs) provides early warnings if somebody is coming too close to those boundaries.&lt;/p&gt;

&lt;h2&gt;How does a company define its risk appetite?&lt;/h2&gt;

&lt;p&gt;Typically, an organization does this by drafting a risk appetite statement (RAS). The first parts of an RAS lay out the company’s strategic objectives and the risks involved.&lt;/p&gt;

&lt;p&gt;A company might want to become the leading software provider in their industry. They should list the strategic objectives that are vital to reaching that goal and also list the risks associated with them. For instance, Ivanti is in the business of delivering cloud-based IT services and security management solutions. That means it’s incumbent on us that our risk appetite statement catalogs all the risks involved in that line of business and explains how we’ll manage them.&lt;/p&gt;

&lt;p&gt;Here’s an example of how one section of a risk appetite statement might look for a software provider:&lt;/p&gt;

&lt;blockquote&gt;
&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th colspan="2" scope="col"&gt;
			&lt;p&gt;General Risk Appetite&lt;/p&gt;

			&lt;p&gt;[Company XYZ] adopts a balanced approach to risk, recognizing that not all risks are equal and that some level of risk is necessary to achieve our strategic goals.&lt;/p&gt;
			&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Innovation Risk&lt;/td&gt;
			&lt;td&gt;We have a high risk appetite for investing in advanced technologies and innovative solutions that differentiate our products in the competitive landscape. We understand this requires accepting a degree of uncertainty in R&amp;amp;D and product development.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Operational Risk&lt;/td&gt;
			&lt;td&gt;We maintain a low to moderate risk appetite. While striving for operational excellence, we prioritize initiatives that improve efficiency and service quality without compromising our delivery standards.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Security Risk&lt;/td&gt;
			&lt;td&gt;We have an extremely low risk appetite for security threats and breaches. Our commitment to network security and data protection is paramount, and we invest substantially in safeguarding our systems and our clients’ data.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Compliance Risk&lt;/td&gt;
			&lt;td&gt;We have a low risk appetite for non-compliance with legal and regulatory requirements. Ensuring adherence to relevant laws, standards and best practices in all operational areas is critical.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;/blockquote&gt;

&lt;p&gt;The RAS should define the risks that would have the greatest impact on the organization, not everyday risks that are simply part of doing business. It ought to account for multiple risk scenarios; for instance, a specific strategy may entail supply chain risk, such as the effects of being locked into a vendor or the dangers of regulatory exposure if a supplier mishandles customer data.&lt;/p&gt;

&lt;p&gt;It should also define the amount of financial risk a company is willing to take on. If its objectives include offering a new product or service, there's always a chance of failure in the marketplace.&lt;/p&gt;

&lt;h2&gt;Components of risk appetite&lt;/h2&gt;

&lt;p&gt;These are key factors that have to be considered in defining risk appetite:&lt;/p&gt;

&lt;h3&gt;Risk capacity&lt;/h3&gt;

&lt;p&gt;This refers to the &lt;em&gt;maximum&lt;/em&gt; amount of risk that an organization can bear. Financial resources, operational capabilities and regulatory constraints decide this. And risk capacity differs from risk appetite: an organization may have the capacity to take on a certain level of risk but might choose not to, based on its risk appetite.&lt;/p&gt;

&lt;h3&gt;Risk tolerance&lt;/h3&gt;

&lt;p&gt;Whereas risk capacity is about how much risk an organization can withstand, risk tolerance is an acceptable deviation from its target. It may even set different tolerances for different areas. For example, an organization might be good with taking a chance on a new product, but risk-avoidant about managing customer data.&lt;/p&gt;

&lt;h3&gt;Risk thresholds&lt;/h3&gt;

&lt;p&gt;We’ve mentioned risk monitoring and KRIs above, as they’re used to keep a company from crossing risk thresholds — the “red lines” that represent too much risk. Crossing a risk threshold might require a change in plans, increased safety measures or even a complete halt to what they’re doing.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: Ivanti Research Report: &lt;a href="https://www.ivanti.com/resources/research-reports/cybersecurity-risk-management"&gt;Aligning Perspectives: Cyber Risk Management in the C-Suite&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Why is risk appetite important in exposure management?&lt;/h2&gt;

&lt;p&gt;Once upon a time, mitigating digital risk was much simpler than it is today. That’s because most large organizations’ attack surfaces have vastly expanded over time. The addition of more devices and applications, used by employees in more places, have transformed the workplace and expanded the digital threat landscape.&lt;/p&gt;

&lt;p&gt;It’s one reason why &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management"&gt;Ivanti research&lt;/a&gt; found that more than half of IT professionals are not very confident they can prevent a damaging security incident in the next 12 months. More than one in three even say they’re less prepared to detect threats and respond to incidents than they were a year ago.&lt;/p&gt;

&lt;p&gt;Traditional &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;vulnerability management&lt;/a&gt; has long been focused on reactively remediating software and hardware vulnerabilities and other CVEs, but usually only applies intermittent scans. But today’s cyberthreat scenario demands a new approach.&lt;/p&gt;

&lt;p&gt;Modern exposure management is focused on continually, proactively finding and remediating risks and vulnerabilities across the entire digital attack surface. That’s whether they arise from exposed IT assets, unsecured endpoints and applications, cloud-based resources or other vectors. What makes exposure management and risk appetite so intertwined?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Assessing exposure according to acceptable risk levels:&lt;/em&gt; Exposure management involves quantifying the risk levels associated with different exposures. By defining acceptable risk, organizations can compare the possible impact of different risks with their risk appetite.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Deploying resources based on risk:&lt;/em&gt; Organizations must prioritize which exposures pose the greatest threat to their strategies – an assessment they can only make with a clear understanding of their risk appetite. That prioritization lets them concentrate resources on mitigating the most critical ones, often with the help of an advanced RBVM tool.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Adjusting risk appetite:&lt;/em&gt; As a business environment changes or new risks emerge, risk appetite may need to be adjusted. The data and insights organizations uncover as part of their exposure management practice help them make informed decisions around such adjustments.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Ensuring compliance:&lt;/em&gt; Many industries have regulatory requirements related to risk management, which in turn influence an organization’s risk appetite. Exposure management involves identifying and addressing risks that could cause non-compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: Ivanti Research Report: &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management"&gt;Attack Surface Management&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Looking at security risk through the lens of exposure management&lt;/h2&gt;

&lt;p&gt;A notable difference between exposure management and other security practices is that exposure management includes not just prioritizing remediation of the risks that pose the most risk to the organization, but actively defining which risks fall within an organization’s risk tolerance. For example, an e-commerce company may be willing to accept heightened security risks in order to keep their site functional on Black Friday – the tradeoff is worth it to them.&lt;/p&gt;

&lt;p&gt;Instead of viewing every potential risk as a crisis that needs instant remediation, organizations need to prioritize them based on business needs. In this framework, most risk &lt;em&gt;isn’t&lt;/em&gt; bad: it’s about how you react to it, control it and mitigate it to bring it to an acceptable level.&lt;/p&gt;
</description><pubDate>Mon, 10 Feb 2025 14:44:03 Z</pubDate></item><item><guid isPermaLink="false">54e34b7e-3190-421c-b6b0-4eb43e47a380</guid><link>https://www.ivanti.com/blog/exposure-management-checklist</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><title>The Five Ws (and H) of Exposure Management</title><description>&lt;p&gt;The Five Ws and H — who, what, when, where, why and how — have long been used as a checklist in journalism to make sure a story covers every piece of essential information. The same concept is employed here to make sure all the essential information about exposure management is covered in this post.&lt;/p&gt;

&lt;p&gt;Read on for a better understanding of &lt;a href="https://www.ivanti.com/resources/exposure-management-strategy-guide" target="_blank"&gt;exposure management &lt;/a&gt;(the Five Ws) and actionable guidance for implementing it (the H).&lt;/p&gt;

&lt;h2&gt;Who&lt;/h2&gt;

&lt;h3&gt;Who invented exposure management?&lt;/h3&gt;

&lt;p&gt;The term “exposure management” has been used in various contexts for decades, though it’s unknown when it was first used within the context of cybersecurity. That being said, exposure management is an evolution of vulnerability management, so it’s not an entirely new concept within the cybersecurity space but rather a reimagining of a preexisting practice.&lt;/p&gt;

&lt;p&gt;Exposure management started gaining popularity in the cybersecurity space in 2022 as analyst firms began publishing research reports on the topic and vendors began releasing exposure management products and services.&lt;/p&gt;

&lt;h3&gt;Who benefits from exposure management?&lt;/h3&gt;

&lt;p&gt;Exposure management benefits a range of internal stakeholders — I recommend reading on if you fit any of the following profiles:&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;Role&lt;/th&gt;
			&lt;th scope="col"&gt;Relevant Responsibility&lt;/th&gt;
			&lt;th scope="col"&gt;Benefit&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Security architect&lt;/td&gt;
			&lt;td&gt;Develop secure systems and networks&lt;/td&gt;
			&lt;td&gt;Improved understanding of risk posed to systems and networks&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Vulnerability risk management (VRM)&lt;/td&gt;
			&lt;td&gt;Identify exposures and prioritize for remediation&lt;/td&gt;
			&lt;td&gt;Improved efficiency and accuracy of prioritization process&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;SOC / security analyst&lt;/td&gt;
			&lt;td&gt;Detect and respond to cyber attacks&lt;/td&gt;
			&lt;td&gt;Lower volume of incidents requiring reactive response&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;IT operations&lt;/td&gt;
			&lt;td&gt;Remediate exposures prioritized by VRM&lt;/td&gt;
			&lt;td&gt;Lower volume of exposures requiring remediation&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Development&lt;/td&gt;
			&lt;td&gt;Make code changes to resolve exposures in software&lt;/td&gt;
			&lt;td&gt;Lower volume of exposures requiring resolution&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Chief information security officer (CISO)&lt;/td&gt;
			&lt;td&gt;Oversee infosec program that protects systems and data&lt;/td&gt;
			&lt;td&gt;Stronger security posture better protects systems and data&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Chief information officer (CIO)&lt;/td&gt;
			&lt;td&gt;Own management, implementation and usability of IT&lt;/td&gt;
			&lt;td&gt;Less downtime leads to improved &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex"&gt;digital employee experience&lt;/a&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;C-suite&lt;/td&gt;
			&lt;td&gt;Ensure day-to-day operations align with long-term strategies&lt;/td&gt;
			&lt;td&gt;Better equipped to make decisions regarding risk&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Board of directors&lt;/td&gt;
			&lt;td&gt;Protect interests of shareholders and stakeholders&lt;/td&gt;
			&lt;td&gt;Fewer attacks means less damage to reputation and revenue&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Business unit (BU) leader&lt;/td&gt;
			&lt;td&gt;Lead a specific division towards its goals&lt;/td&gt;
			&lt;td&gt;Decreased downtime of BU’s critical systems and services&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Public relations (PR)&lt;/td&gt;
			&lt;td&gt;Reverse negative communication and perception around a crisis&lt;/td&gt;
			&lt;td&gt;Fewer PR crises stemming from cyber attacks&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Chief financial officer (CFO) / finance organization&lt;/td&gt;
			&lt;td&gt;Maintain the fiscal health of the organization&lt;/td&gt;
			&lt;td&gt;Less unanticipated costs for cyber attack response and recovery&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Compliance team&lt;/td&gt;
			&lt;td&gt;Ensure adherence to regulations and avoidance of missteps that could harm the organization&lt;/td&gt;
			&lt;td&gt;Lower odds of violating regulations or experiencing other harm thanks to fewer breaches&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;External stakeholders also benefit when exposure management results in improved security postures for organizations. For example, customers are at lower risk of having their personally identifiable information (PII) compromised in a data breach and shareholders are less likely to see stock prices dip due to a brand’s reputation being damaged by a cyber attack.&lt;/p&gt;

&lt;h3&gt;Who “owns” exposure management?&lt;/h3&gt;

&lt;p&gt;This may seem illogical, or even controversial, but it’s the C-suite that owns exposure management. While Security owns day-to-day exposure management operations, those operations are executed at the direction of the executive team — as noted above, they’re the ones determining the organization’s risk appetite. The numbers support this stance. &lt;a href="https://www.ivanti.com/resources/research-reports/cybersecurity-risk-management"&gt;86% of security professionals&lt;/a&gt; we surveyed said that cybersecurity is a topic discussed at the board level.&lt;/p&gt;

&lt;p&gt;Such a stance may have been blasphemous in the past, as most C-suite members lack the knowledge necessary to make cybersecurity decisions. But by focusing on exposure management, organizations can use quantifiable data to assess risks, reducing reliance on subjective judgment. This means that decisions regarding cybersecurity priorities and responses can be based on measurable risk factors, such as the likelihood of a threat and its potential impact.&lt;/p&gt;

&lt;p&gt;Further, by linking cybersecurity operations directly to risk posture, exposure management offers a greater opportunity for aligning these operations with the overall business strategy. Under this approach, cybersecurity is no longer just a technical requirement but a strategic enabler that supports broader business objectives.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;What&lt;/h2&gt;

&lt;h3&gt;What is exposure management?&lt;/h3&gt;

&lt;p&gt;Exposure management is a proactive cybersecurity practice that enables organizations to maintain their exposures at a level that aligns with their risk appetite. It is, in essence, an evolution of vulnerability management that addresses the shortcomings of traditional vulnerability management practices.&lt;/p&gt;

&lt;p&gt;Exposure management practices are commonly guided by continuous threat exposure management (CTEM) programs.&lt;/p&gt;

&lt;p&gt;Refer to Ivanti’s &lt;a href="https://www.gartner.com/document/4016760" rel="noopener" target="_blank"&gt;Exposure Management glossary page&lt;/a&gt; for a more thorough answer to this question.&lt;/p&gt;

&lt;h3&gt;What is continuous threat exposure management (CTEM)?&lt;/h3&gt;

&lt;p&gt;Continuous threat exposure management — or CTEM — is defined in the 2023 Gartner® &lt;a href="https://www.gartner.com/document/4016760" rel="noopener" target="_blank"&gt;Implement a Continuous Threat Exposure Management (CTEM) Program&lt;/a&gt; report as follows:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Continuous Threat Exposure Management (CTEM) program is a set of processes and capabilities that allow enterprises to continually and consistently evaluate the accessibility, exposure and exploitability of an enterprise’s digital and physical assets.&lt;/p&gt;

&lt;p&gt;At any stage of maturity, a CTEM cycle must include five steps to be completed: scoping, discovery, prioritization, validation and mobilization.”&lt;sup&gt;1&lt;/sup&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;What are the components of exposure management?&lt;/h3&gt;

&lt;p&gt;In its current form, exposure management effectively combines capabilities from these existing categories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/glossary/attack-surface-management-asm" target="_blank"&gt;Attack surface management&lt;/a&gt; (ASM), e.g., &lt;a href="https://www.ivanti.com/products/external-attack-surface-management" target="_blank"&gt;external attack surface management&lt;/a&gt; (EASM) and cyber asset attack surface management (CAASM).&lt;/li&gt;
	&lt;li&gt;Risk-based vulnerability management (RBVM).&lt;/li&gt;
	&lt;li&gt;Validation, e.g., breach and attack simulation (BAS), continuous automated red teaming (CART) and penetration testing as a service (PTaaS).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Expect to see purpose-built exposure management products and platforms as the exposure management market matures.&lt;/p&gt;

&lt;h3&gt;What is risk appetite?&lt;/h3&gt;

&lt;p&gt;Risk appetite is the level of cyber risk an organization is prepared to accept in pursuit of its business objectives, such as increased agility, innovation or performance. To determine its risk appetite, an organization must weigh the cost of maintaining a certain security posture against the benefit of doing so. Setting risk appetite is a business decision, though one that must include input from Security.&lt;/p&gt;

&lt;p&gt;Refer to&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;Understanding Risk Appetite – a Critical Component of Exposure Management&lt;/a&gt;&amp;nbsp;for an in-depth description of risk appetite.&lt;/p&gt;

&lt;h2&gt;Where&lt;/h2&gt;

&lt;h3&gt;Where should exposure management be implemented?&lt;/h3&gt;

&lt;p&gt;Exposure management practices should be implemented at all organizations that rely on technology that’s accessible from the internet or other external pathways.&lt;/p&gt;

&lt;p&gt;Exposure management is especially important for organizations that are beholden to laws and/or other regulations regarding the safe handling of personal data. Examples include the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR).&lt;/p&gt;

&lt;p&gt;Organizations likely to have lots of unknown devices connecting to the network and other unknown internet-facing assets in their environment are also optimal candidates for exposure management. Unknown assets often proliferate as a result of bring your own device (BYOD) policies and mergers and acquisitions.&lt;/p&gt;

&lt;h2&gt;When&lt;/h2&gt;

&lt;h3&gt;When should I implement exposure management?&lt;/h3&gt;

&lt;p&gt;According to a &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024" rel="noopener" target="_blank"&gt;Gartner press release&lt;/a&gt;, “By 2026, Gartner predicts that organizations prioritizing their security investments based on a CTEM program will realize a two-thirds reduction in breaches.”&lt;sup&gt;2 &lt;/sup&gt;We believe that’s a compelling reason to begin implementing exposure management as soon as possible. It’s also good news at a time when &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management"&gt;organizations’ attack surfaces are rapidly expanding&lt;/a&gt;, putting them at higher risk of attack.&lt;/p&gt;

&lt;p&gt;More good news: any organization practicing vulnerability management has already laid the foundation upon which they can build an exposure management practice. Read on for actionable advice on how to do so.&lt;/p&gt;

&lt;h2&gt;Why&lt;/h2&gt;

&lt;h3&gt;Why implement exposure management?&lt;/h3&gt;

&lt;p&gt;Many organizations have an incomplete understanding of their cyber risk due to limited views of the assets and exposures in their environments. Lots of effort is exerted in attempts to lower risk by remediating exposures, but the ROI on that effort is often low due to shortcomings associated with traditional vulnerability management methods.&lt;/p&gt;

&lt;p&gt;Such organizations thus remain at elevated risk of experiencing cyber attacks that take advantage of un-remediated exposures and can negatively impact their operations, image and revenue. Exposure management solves this problem by empowering those organizations to maintain their exposures in alignment with their risk appetite.&lt;/p&gt;

&lt;p&gt;The following is an overview of the shortcomings of traditional vulnerability management that exposure management addresses:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shortcoming #1: Organizations look only at a narrow sliver of their continuously expanding attack surfaces.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many organizations only closely monitor and manage their traditional perimeter — endpoints and servers — from a cybersecurity standpoint.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s a problem: Full attack surface visibility is needed to properly protect against all potential threats.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Modern attack surfaces have expanded beyond the traditional perimeter to include mobile devices, applications, websites, certificates/domains and more. Each of these components introduces added risk to an organization that must be accounted for.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shortcoming #2: The number of cybersecurity exposures organizations face continues to grow at an unmanageable rate.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are hundreds of thousands of existing Common Vulnerabilities and Exposures (CVEs) and dozens — sometimes hundreds — more are published to the National Vulnerability Database (NVD) every day. And while CVEs are often the only type of exposure organizations account for, they face many others, such as misconfiguration of assets and security controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s a problem: Remediating all exposures is operationally infeasible, leaving organizations stuck in reactive mode.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organizations are overwhelmed by the constant onslaught of exposures turning up in their environments. They can’t fix every exposure as that would require critical systems to be offline far too often — not to mention many exposures don’t have known fixes.&lt;/p&gt;

&lt;p&gt;This forces them into firefighting mode, always trying to unbury themselves from endless exposures or overcome ongoing security incidents instead of working proactively to improve their security posture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shortcoming #3: Remediation activities are prioritized based strictly on the severity of vulnerabilities.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Common Vulnerability Scoring System (CVSS) v3.1 is among the most popular methods for prioritizing vulnerabilities for remediation. CVSS assigns vulnerabilities with scores from zero to 10 based on their severity — zero being the least critical and 10 being the most.&lt;/p&gt;

&lt;p&gt;Unfortunately, those scores don't account for real-world threat context — meaning organizations employing CVSS are misguided if their intent in doing so is to reduce risk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s a problem: Remediation decisions are based on the makeup of vulnerabilities instead of a given organization’s risk appetite and the potential impact a given vulnerability may pose to their business.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organizations that use CVSS are basing decisions on vulnerabilities’ characteristics without accounting for their own. For starters, since CVSS scores don’t accurately reflect risk, organizations can’t use CVSS to determine if a given vulnerability exceeds their individual risk appetite.&lt;/p&gt;

&lt;p&gt;Further, CVSS doesn’t enable organizations to determine how a vulnerability might impact their business — certainly a crucial consideration when determining whether that vulnerability needs to be remediated.&lt;/p&gt;

&lt;h2&gt;How&lt;/h2&gt;

&lt;h3&gt;How do I implement exposure management?&lt;/h3&gt;

&lt;p&gt;This bears repeating one more time: exposure management is an evolution of vulnerability management. Most organizations thus already have the foundation for its exposure management practice in place.&lt;/p&gt;

&lt;p&gt;But how do you advance from vulnerability management to exposure management? Here are six best practices to guide the process:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #1: Widen your attack surface aperture&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Evolving to exposure management requires widening your attack surface aperture to include non-patchable attack surfaces. While you’ll always need to account for traditional devices and applications, nowadays, you also need to account for all systems, applications and subscriptions, including those not owned by IT or even managed by the business.&lt;/p&gt;

&lt;p&gt;Examples include everything from third-party applications and services — such as SaaS, supply chain dependencies and online code repositories — to corporate social media accounts and leaked data. To gain this visibility, you’ll need to implement digital risk protection services (DRPS) and &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;external attack surface management (EASM)&lt;/a&gt; solutions in addition to any existing &lt;a href="https://www.techtarget.com/searchsecurity/definition/cybersecurity-asset-management-CSAM" rel="noopener" target="_blank"&gt;cybersecurity asset management (CSAM)&lt;/a&gt; tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #2: Reframe remediation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you expand your exposure management program to include non-patchable attack surfaces, you’ll also need to expand it to include means for managing your exposure through ways other than patching.&lt;/p&gt;

&lt;p&gt;There are many routes to resolution for threat exposures, ranging from accepting and managing the risk by increasing monitoring, through to mitigation and resolutions that, in addition to patching, may mean implementing a policy change or redeveloping an application.&lt;/p&gt;

&lt;p&gt;Remember, there's often more than one fix to an issue, and your team will often need to collaborate closely with other teams to implement those fixes, including infrastructure and operations teams and enterprise architecture functions. In some cases, your team may need to acquire new skills and understanding to execute fixes that fall under Security’s umbrella.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #3: Reprioritize&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As mentioned under “Why implement exposure management?” above, using CVSS to prioritize exposures for remediation omits risk from the prioritization process. That can be remedied through the use of &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management (RBVM)&lt;/a&gt; solutions.&lt;/p&gt;

&lt;p&gt;&lt;img alt="infographic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/1/ws-ls-blog-min.png"&gt;&lt;/p&gt;

&lt;p&gt;Here’s how such solutions improve exposure management, using the graphic above as a reference:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;There are 330,000+ known vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Fortunately, you don’t need to remediate every vulnerability in your environment. The number that are tied to ransomware is low, and even less are trending/active exploits.&lt;/li&gt;
	&lt;li&gt;RBVM solutions provide risk-based scoring and views to help you focus remediation efforts on that small number of vulnerabilities that pose a significant risk.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ultimately, a risk-based approach ensures you don’t waste time and effort mitigating or remediating any of the hundreds of thousands of exposures that pose no real danger to your organization, and that the effort you do expend actually goes toward improving your security posture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #4: Build a bridge to the business side&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With traditional vulnerability management, the “business side” typically only learns a patch is coming when they receive a notification telling them their PC needs to restart to finish installing updates — such is not the case with exposure management.&lt;/p&gt;

&lt;p&gt;For starters, their input is required to determine the business impact of exposures and your organization’s risk appetite. You’ll need to continually work with the revenue-generating functions of the organization to determine what systems and solutions have a high impact on their priorities so that exposures that threaten those systems and solutions can be prioritized accordingly.&lt;/p&gt;

&lt;p&gt;This is the type of work that earns Security a seat at the business table — work that shows Security exists to enable the business. Of course, teams on the business side may not be thrilled with the prospect of taking on extra work for something that has never been their responsibility, but there are ways to earn their buy-in:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CISOs need to lead the outreach effort — their position within the organization will make it easier for them to open the necessary doors.&lt;/li&gt;
	&lt;li&gt;Once you’re in the door, work with senior leadership to develop metrics that will enable them to make effective exposure management decisions without having to be security specialists.&lt;/li&gt;
	&lt;li&gt;Ensure you keep all the departments you interact with informed on the various options that exist for resolving issues that may impact them. You may need to put in extra time here to shed Security’s reputation for being overly restrictive.&lt;/li&gt;
	&lt;li&gt;Make it clear to them that the business will simply have to accept large amounts of unknown and unquantified risk if a poorly governed exposure management program fails to accurately scope, discover, prioritize and validate issues, thereby leading to a lack of visibility into threat exposure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best practice #5: Validate, validate, validate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional vulnerability management is guided by prioritization, while exposure management couples prioritization with validation. Validation is necessary since prioritization alone leaves a large volume of issues to resolve.&lt;/p&gt;

&lt;p&gt;In the context of exposure management, validation involves:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Assessing how potential attackers can exploit an identified exposure.&lt;/li&gt;
	&lt;li&gt;Estimating the highest potential impact of potential attack paths.&lt;/li&gt;
	&lt;li&gt;Identifying how monitoring and control systems might react in the event of an attack.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Validation can be conducted via a mixture of manual and technological methods, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Penetration testing conducted by automated tools, internal teams or contract pen testing as a service (PTaaS).&lt;/li&gt;
	&lt;li&gt;Red team exercises.&lt;/li&gt;
	&lt;li&gt;Breach and attack simulation (BAS).&lt;/li&gt;
	&lt;li&gt;Attack path analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best practice #6: Crawl, walk, run&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Last but not least, the final best practice for evolving to exposure management is: don’t attempt to do it overnight. Use your vulnerability management practice as your starting point and expand from there by adopting the other best practices covered here as your bandwidth and budget allow.&lt;/p&gt;

&lt;hr&gt;
&lt;ol&gt;
	&lt;li&gt;Gartner. D’Hoinne, J., Schneider, M., Shoard, P. (2022, July 21). &lt;em&gt;Implement a Continuous Threat Exposure Management (CTEM) Program&lt;/em&gt;. &lt;a href="https://www.gartner.com/document/4016760" rel="noopener" target="_blank"&gt;https://www.gartner.com/document/4016760&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Gartner Press Release. &lt;em&gt;Gartner Identifies the Top Cybersecurity Trends for 2024&lt;/em&gt;. (2024, February 22). &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024" rel="noopener" target="_blank"&gt;https://www.gartner.com/en/newsroom/press-releases/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.&lt;/p&gt;
</description><pubDate>Wed, 22 Jan 2025 17:10:20 Z</pubDate></item><item><guid isPermaLink="false">914e1cf6-8008-4bbf-8016-7c108b0eb5e1</guid><link>https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>DEX</category><title>8 Attack Surface Reduction Best Practices for Organizations</title><description>&lt;p&gt;Increases in &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;attack surface&lt;/a&gt; size lead to increased cybersecurity risk. Thus, logically, decreases in attack surface size lead to decreased cybersecurity risk.&lt;/p&gt;

&lt;p&gt;While some&amp;nbsp;attack surface management&amp;nbsp;solutions offer remediation capabilities that aid in this effort, remediation is reactive. As with all things related to security and risk management, being proactive is preferred.&lt;/p&gt;

&lt;p&gt;The good news is that ASM solutions&amp;nbsp;aren't&amp;nbsp;the only weapons security teams have in the attack surface fight. There are many steps an organization can take to lessen the exposure of its IT environment and preempt cyberattacks.&lt;/p&gt;

&lt;h2&gt;How do I reduce my organization’s attack surface?&lt;/h2&gt;

&lt;p&gt;Unfortunately for everyone but malicious actors, there’s no eliminating your entire attack surface, but the following best practice security controls detailed in this post will help you significantly shrink it:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Reduce complexity&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#two"&gt;Adopt a zero trust strategy for logical and physical access control&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#three"&gt;Evolve to risk-based vulnerability management&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#four"&gt;Implement network segmentation and microsegmentation&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#five"&gt;Strengthen software and asset configurations&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#six"&gt;Enforce policy compliance&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#seven"&gt;Train all employees on cybersecurity policies and best practices&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;a href="#eight"&gt;Improve digital employee experience (DEX)&lt;/a&gt;&lt;/p&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As noted in our &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;attack surface glossary entry&lt;/a&gt;, different attack vectors can technically fall under multiple types of attack surfaces&amp;nbsp;—&amp;nbsp;digital, physical and/or human. Similarly, many of the best practices in this post can help you reduce multiple types of attack surfaces.&lt;/p&gt;

&lt;p&gt;For that reason, we have included an attack surface reduction checklist along with each best practice that signifies which type(s) of attack surface a particular best practice primarily addresses.&lt;/p&gt;

&lt;h2 id="one"&gt;#1: Reduce complexity&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Reduce your cybersecurity attack surface by reducing complexity. Seems obvious, right? And it is. However, many companies have long failed at this seemingly simple step. Not because it’s not obvious, but because it hasn’t always been easy to do.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;Research from Randori and ESG&lt;/a&gt;&amp;nbsp;reveals seven in 10 organizations were compromised by an unknown, unmanaged or poorly managed internet-facing asset over the past year.&amp;nbsp;Cyber asset attack surface management (CAASM) solutions enable such organizations to identify all their assets&amp;nbsp;—&amp;nbsp;including those that are unauthorized and unmanaged&amp;nbsp;—&amp;nbsp;so they can be secured, managed or even removed from the enterprise network.&lt;/p&gt;

&lt;p&gt;Any unused or unnecessary assets, from endpoint devices to network infrastructure, should also be removed from the network and properly discarded.&lt;/p&gt;

&lt;p&gt;The code that makes up your software applications is another area where complexity contributes to the size of your attack surface. Work with your development team to identify where opportunities exist to minimize the amount of executed code exposed to malicious actors, which will thereby also reduce your attack surface.&lt;/p&gt;

&lt;h2 id="two"&gt;#2: Adopt a zero trust strategy for logical and physical access control&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;The National Institute of Standards and Technology (NIST)&amp;nbsp;&lt;a href="https://csrc.nist.gov/glossary/term/zero_trust" rel="noopener" target="_blank"&gt;defines zero trust&lt;/a&gt;&amp;nbsp;as follows:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“A collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In other words, for every access request,&amp;nbsp;“&lt;a href="https://www.nist.gov/blogs/taking-measure/zero-trust-cybersecurity-never-trust-always-verify" rel="noopener" target="_blank"&gt;never trust, always verify&lt;/a&gt;.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Learn how Ivanti can help you adopt the &lt;a href="/resources/v/doc/ivi/2694/fa2e133f20a8" target="_blank"&gt;NIST CSF in&amp;nbsp;The NIST Cybersecurity Framework (CSF): Mapping Ivanti’s Solutions to CSF Controls&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organizations taking a&amp;nbsp;&lt;a href="https://www.ivanti.com/network-security/zero-trust-security"&gt;zero trust&lt;/a&gt;&amp;nbsp;approach to logical access control minimizes the attack surface&amp;nbsp;—&amp;nbsp;and likelihood of data breaches&amp;nbsp;—&amp;nbsp;by continuously verifying posture and compliance and providing least-privileged access.&lt;/p&gt;

&lt;p&gt;And while zero trust&amp;nbsp;isn't&amp;nbsp;a product but a strategy, there are products that can help you&amp;nbsp;&lt;em&gt;implement&lt;/em&gt;&amp;nbsp;a zero trust strategy. Chief among those products are those included in the&amp;nbsp;&lt;a href="https://www.gartner.com/en/information-technology/glossary/secure-access-service-edge-sase" rel="noopener" target="_blank"&gt;secure access service edge (SASE)&lt;/a&gt;&amp;nbsp;framework:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Software-defined wide area network (SD-WAN)&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-announces-lookout-casb-swg-partnership-for-ivanti-neurons-for-zero-trust-access"&gt;Secure web gateway (SWG)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-announces-lookout-casb-swg-partnership-for-ivanti-neurons-for-zero-trust-access"&gt;Cloud access security broker (CASB)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Next-generation firewall (NGFW)&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Zero trust network access (ZTNA)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And though it’s not typically viewed in this manner, a zero trust strategy can extend beyond logical access control to physical access control. When it comes to allowing anyone into secure areas of your facilities, remember to never trust, always verify. Mechanisms like access cards and biometrics can be used for this purpose.&lt;/p&gt;

&lt;h2 id="three"&gt;#3: Evolve to risk-based vulnerability management&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;First, the bad news: the&amp;nbsp;&lt;a href="https://nvd.nist.gov/general/nvd-dashboard" rel="noopener" target="_blank"&gt;US National Vulnerability Database (US NVD)&lt;/a&gt;&amp;nbsp;contains over 160,000 scored vulnerabilities and dozens more are added every day. Now, the good news: a vast majority of vulnerabilities have never been exploited, which means they can’t be used to perpetrate a cyberattack, which means they&amp;nbsp;aren't&amp;nbsp;part of your attack surface.&lt;/p&gt;

&lt;p&gt;In fact, a&amp;nbsp;&lt;a href="https://www.securin.io/ransomware/" rel="noopener" target="_blank"&gt;ransomware research report&lt;/a&gt;&amp;nbsp;from Securin, Cyber Security Works (CSW), Ivanti and Cyware showed only 180 of those 160,000+ vulnerabilities were trending active exploits.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Comparison of total NVD vulnerabilities vs. those that endanger an organization&lt;/em&gt;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Total NVD graph." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/comparison-of-total-nvd.png"&gt;
&lt;figcaption&gt;Only approximately 0.1% of all vulnerabilities in the US NVD are trending active exploits that pose an immediate risk to an organization&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;A&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2706/12a786ad51e6"&gt;legacy approach to vulnerability management&lt;/a&gt;&amp;nbsp;reliant on stale and static risk scores from the&amp;nbsp;&lt;a href="https://www.first.org/cvss/specification-document" rel="noopener" target="_blank"&gt;Common Vulnerability Scoring System (CVSS)&lt;/a&gt;&amp;nbsp;won’t accurately classify exploited vulnerabilities. And while the&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;Cybersecurity &amp;amp; Infrastructure Security Agency Known Exploited Vulnerabilities (CISA KEV) Catalog&lt;/a&gt;&amp;nbsp;is a step in the right direction,&amp;nbsp;it's&amp;nbsp;incomplete and&amp;nbsp;doesn't&amp;nbsp;account for the criticality of assets in an organization’s environment.&lt;/p&gt;

&lt;p&gt;A true risk-based approach is needed.&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;Risk-based vulnerability management (RBVM)&lt;/a&gt;&amp;nbsp;—&amp;nbsp;as its name suggests&amp;nbsp;—&amp;nbsp;is a cybersecurity strategy that prioritizes vulnerabilities for remediation based on the risk they pose to the organization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2705/11190ce11e80"&gt;The Ultimate Guide to Risk-Based Patch Management&lt;/a&gt;&amp;nbsp;and discover how to evolve your remediation strategy to a risk-based approach.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;RBVM tools&lt;/a&gt;&amp;nbsp;ingest data from&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2752/ce5acd862b13"&gt;vulnerability scanners&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.ivanti.com/services/penetration-testing"&gt;penetration tests&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-vulnerability-knowledge-base"&gt;threat intelligence tools&lt;/a&gt;&amp;nbsp;and other security sources and use it to measure risk and prioritize remediation activities.&lt;/p&gt;

&lt;p&gt;With the intelligence from their RBVM tool in hand, organizations can then go about reducing their attack surface by remediating the vulnerabilities that pose them the most risk. Most commonly, that involves&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2024/practical-demo-minimize-threat-exposure-with-rbvm-patch-management"&gt;patching exploited vulnerabilities&amp;nbsp;&lt;/a&gt;on the infrastructure side and&amp;nbsp;&lt;a href="https://www.ivanti.com/products/application-security-posture-management"&gt;fixing vulnerable code&lt;/a&gt;&amp;nbsp;in the application stack.&lt;/p&gt;

&lt;h2 id="four"&gt;#4: Implement network segmentation and microsegmentation&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Once&amp;nbsp;again,&amp;nbsp;borrowing from the NIST glossary,&amp;nbsp;&lt;a href="https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary" rel="noopener" target="_blank"&gt;network segmentation&lt;/a&gt;&amp;nbsp;is defined as follows:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Splitting a network into sub-networks, for example, by creating separate areas on the network which are protected by firewalls configured to reject unnecessary traffic. Network segmentation minimizes the harm of malware and other threats by isolating it to a limited part of the network.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;From this definition, you can see how segmenting can reduce your attack surface by blocking attackers from certain parts of your network. While&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/definition/network-segmentation?Offer=abMeterCharCount_var2" rel="noopener" target="_blank"&gt;traditional network segmentation&lt;/a&gt;&amp;nbsp;stops those attackers from moving north-south at the network level,&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/tip/How-to-implement-network-segmentation-for-better-security?Offer=abMeterCharCount_var2" rel="noopener" target="_blank"&gt;microsegmentation&lt;/a&gt;&amp;nbsp;stops them from moving east-west at the workload level.&lt;/p&gt;

&lt;p&gt;More specifically,&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/definition/microsegmentation?Offer=abMeterCharCount_var2" rel="noopener" target="_blank"&gt;microsegmentation&lt;/a&gt;&amp;nbsp;goes beyond network segmentation and enforces policies on a more granular basis&amp;nbsp;—&amp;nbsp;for example, by application or device instead of by network.&lt;/p&gt;

&lt;p&gt;For example, it can be used to implement restrictions so an IoT device can only communicate with its application server and no other IoT devices, or to prevent someone in one department from accessing any other department’s systems.&lt;/p&gt;

&lt;h2 id="five"&gt;#5: Strengthen software and asset configurations&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Operating systems, applications and enterprise assets&amp;nbsp;—&amp;nbsp;such as servers and&amp;nbsp;end user, network and IoT devices&amp;nbsp;—&amp;nbsp;typically come unconfigured or with default configurations that favor ease&amp;nbsp;of deployment&amp;nbsp;and use over security. According to&amp;nbsp;&lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Critical Security Controls (CIS Controls) v8&lt;/a&gt;, the following can all be exploitable if left in their default state:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Basic controls&lt;/li&gt;
	&lt;li&gt;Open services and ports&lt;/li&gt;
	&lt;li&gt;Default accounts or passwords&lt;/li&gt;
	&lt;li&gt;Pre-configured Domain Name System (DNS) settings&lt;/li&gt;
	&lt;li&gt;Older (vulnerable) protocols&lt;/li&gt;
	&lt;li&gt;Pre-installation of unnecessary software&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Clearly,&amp;nbsp;such configurations increase the size of an attack surface. To remedy the situation, Control 4: Secure Configuration of Enterprise Assets and Software of&amp;nbsp;&lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Controls v8&lt;/a&gt;&amp;nbsp;recommends developing and applying strong initial&amp;nbsp;configurations,&amp;nbsp;then continually managing and maintaining those configurations to avoid degrading security of software and assets.&lt;/p&gt;

&lt;p&gt;Here are some free resources and tools your team can leverage to help with this effort:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/cis-benchmarks" rel="noopener" target="_blank"&gt;CIS Benchmarks List&lt;/a&gt;&amp;nbsp;– Configuration recommendations for over 25 vendor product families&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://ncp.nist.gov/repository" rel="noopener" target="_blank"&gt;NIST National Checklist Program (NCP)&lt;/a&gt;&amp;nbsp;– Collection of checklists providing guidance on setting software security configurations&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://learn.cisecurity.org/cis-cat-lite" rel="noopener" target="_blank"&gt;CIS-CAT Lite&lt;/a&gt;&amp;nbsp;—&amp;nbsp;Assessment tool that helps users implement secure configurations for a range of technologies&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="six"&gt;#6: Enforce policy compliance&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;It’s no secret that endpoints are a major contributor to the size of most attack surfaces&amp;nbsp;—&amp;nbsp;especially in the age of&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;Everywhere Work&lt;/a&gt;&amp;nbsp;when more employees are working in hybrid and remote roles than ever before.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;Seven in 10 government employees&lt;/a&gt;&amp;nbsp;now work virtually at least part of the time.&lt;/p&gt;

&lt;p&gt;It’s hard enough getting employees to&amp;nbsp;follow&amp;nbsp;IT and security policies when they’re inside the&amp;nbsp;office,&amp;nbsp;let alone when 70% of them are spread all over the globe.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Unified endpoint management (UEM)&lt;/a&gt;&amp;nbsp;tools ensure universal policy compliance by automatically enforcing policies. This fact should come as no surprise to IT and security professionals, many of whom consider UEM a commodity at this point. In fact,&amp;nbsp;&lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4017175" rel="noopener" target="_blank"&gt;Gartner predicts&lt;/a&gt;&amp;nbsp;that 90% of its clients will manage most of their estate with cloud-based UEM tools by just 2025.&lt;/p&gt;

&lt;p&gt;Nonetheless, UEM is the best option for enforcing IT and security policy compliance, so I'd&amp;nbsp;be remiss to omit it from this list.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2508/b7d55619d0ee"&gt;The Ultimate Guide to Unified Endpoint Management&lt;/a&gt;&amp;nbsp;and&amp;nbsp;learn about the key business benefits and endpoint security use cases for modern UEM solutions.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Additionally, beyond compliance, modern UEM tools offer several other capabilities that can help you identify, manage and reduce your attack surface:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Have complete visibility into IT assets by discovering all devices on your network&amp;nbsp;—&amp;nbsp;a key&amp;nbsp;ASM capability for organizations without a CAASM solution.&lt;/li&gt;
	&lt;li&gt;Provision devices with the appropriate software and access permissions, then automatically update that software as needed&amp;nbsp;—&amp;nbsp;no user interactions required.&lt;/li&gt;
	&lt;li&gt;Manage all types of devices across the entire&amp;nbsp;lifecycle,&amp;nbsp;from onboarding to&amp;nbsp;retirement,&amp;nbsp;to ensure&amp;nbsp;they'reproperly discarded once no longer in use.&lt;/li&gt;
	&lt;li&gt;Automatically enforce device configurations (refer to&amp;nbsp;&lt;a href="#five"&gt;#5: Strengthen software and asset configurations&lt;/a&gt; to learn more about the importance of this capability).&lt;/li&gt;
	&lt;li&gt;Support&amp;nbsp;&lt;a href="#two"&gt;zero trust access&lt;/a&gt;&amp;nbsp;and contextual authentication, vulnerability, policy, configuration and data management&amp;nbsp;&lt;a href="https://www.gartner.com/reviews/market/unified-endpoint-management-tools" rel="noopener" target="_blank"&gt;by integrating with&lt;/a&gt;&amp;nbsp;identity,&amp;nbsp;security and remote-access tools. For example,&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/better-together-unified-endpoint-management-uem-mobile-threat-defense-mtd"&gt;UEM and mobile threat defense (MTD)&lt;/a&gt;&amp;nbsp;tools can integrate to enable you to enact risk-based policies to protect mobile devices from compromising the corporate network and its assets.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2 id="seven"&gt;#7: Train all employees on cybersecurity policies and attack surface reduction best practices&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;X&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Seventy-four percent&amp;nbsp;of breaches analyzed for the&amp;nbsp;&lt;a href="https://www.verizon.com/business/resources/reports/dbir/" rel="noopener" target="_blank"&gt;2023 Verizon Data Breaches Investigation Report (DBIR)&lt;/a&gt;&amp;nbsp;involved a human element.&lt;/p&gt;

&lt;p&gt;Thus, it should come as no surprise when you review the data from Ivanti’s 2023&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2747/a856c631661d" target="_blank"&gt;Government Cybersecurity Status Report&lt;/a&gt;&amp;nbsp;and see the percentages of employees around the world that don’t believe their actions have any impact on their organization’s ability to avert cyberattacks:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Do employees think their own actions matter?&lt;/em&gt;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="do employees think their actions matter results by country" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/do-employees-think-their-actions-matter.png"&gt;
&lt;figcaption&gt;Many employees don't believe their actions impact their organization's ability to stay safe from cyberattacks.&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;In the immortal words of&amp;nbsp;&lt;a href="https://www.britannica.com/biography/Alexander-Pope-English-author" rel="noopener" target="_blank"&gt;Alexander Pope&lt;/a&gt;: “To err is human…” In cybersecurity terms:&amp;nbsp;until AI officially takes over, humans will remain a significant part of your attack surface. And until then, human attack surfaces must be managed and reduced wherever possible.&lt;/p&gt;

&lt;p&gt;Thus far, the best way to do&amp;nbsp;that's proven&amp;nbsp;to be cybersecurity training, both on general best practices and company-specific policies&amp;nbsp;—&amp;nbsp;and definitely don’t forget to include a social engineering module.&lt;/p&gt;

&lt;p&gt;Many cybersecurity practitioners agree. When the question&amp;nbsp;“&lt;a href="https://www.reddit.com/r/cybersecurity/comments/12ygfnw/in_your_experience_what_security_measure_has_been/?utm_source=share&amp;amp;utm_medium=web2x&amp;amp;context=3" rel="noopener" target="_blank"&gt;In your experience, what security measure has been the most successful in preventing cyberattacks and data breaches?&lt;/a&gt;”&amp;nbsp;was posed in&amp;nbsp;&lt;a href="https://www.reddit.com/" rel="noopener" target="_blank"&gt;Reddit's&lt;/a&gt;&amp;nbsp;&lt;a href="https://www.reddit.com/r/cybersecurity/" rel="noopener" target="_blank"&gt;r/cybersecurity&lt;/a&gt; subreddit,&amp;nbsp;many&amp;nbsp;of the top comments referenced the need for user education:&lt;/p&gt;

&lt;figure&gt;&lt;img alt="reddit comment: user training" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/reddit-1.png"&gt;
&lt;figcaption&gt;Reddit / u/Forbesington&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="reddit comment: education of users" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/reddit-2.png"&gt;
&lt;figcaption&gt;Reddit / u/slybythenighttothecape&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;figure&gt;&lt;img alt="reddit comment: user education" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/reddit-3.png"&gt;
&lt;figcaption&gt;Reddit / u/_DudeWhat&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="reddit comment: security awareness" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/06/reddit-4.png"&gt;
&lt;figcaption&gt;Reddit / u/onneseen&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;To once again borrow from&amp;nbsp;&lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Controls v8&lt;/a&gt;, Control 14:&amp;nbsp;Security Awareness and Skills Training encourages organizations to do the following: “Establish and maintain a security awareness program to influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise.”&lt;/p&gt;

&lt;p&gt;CIS&amp;nbsp;—&amp;nbsp;the&amp;nbsp;&lt;a href="https://www.cisecurity.org/cis-benchmarks" rel="noopener" target="_blank"&gt;Center for Internet Security&lt;/a&gt;&amp;nbsp;—&amp;nbsp;also recommends leveraging the following resources to help build&amp;nbsp;a security&amp;nbsp;awareness program:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://csrc.nist.gov/pubs/sp/800/50/final" rel="noopener" target="_blank"&gt;NIST® Special Publication (SP) 800-50 Infosec Awareness Training&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ncsc.gov.uk/collection/10-steps/engagement-and-training" rel="noopener" target="_blank"&gt;National Cyber Security Centre (NCSC) – 10 Steps to Cyber Security – Engagement and training&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-program/awareness-campaigns" rel="noopener" target="_blank"&gt;EDUCAUSE – Awareness Campaigns&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://staysafeonline.org" rel="noopener" target="_blank"&gt;National Cyber Security Alliance (NCSA)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.sans.org/security-awareness-training/resources/" rel="noopener" target="_blank"&gt;SANS Security Awareness Training Resources&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Security and IT staff&amp;nbsp;—&amp;nbsp;not just those in non-technical roles&amp;nbsp;—&amp;nbsp;should also be receiving cybersecurity training relevant to their roles. In fact, according to the IT and security decision-makers surveyed by Randori and ESG for their 2022 report on &lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;The State of Attack Surface Management&lt;/a&gt;, providing security and IT staff with more ASM training would be the third most-effective way to improve ASM.&lt;/p&gt;

&lt;p&gt;Ensuring partners, vendors and other third-party contractors take security training as well can also help contain your human attack surface.&lt;/p&gt;

&lt;h2 id="eight"&gt;#8: Improve digital employee experience (DEX)&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Digital attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Physical attack surface&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Human attack surface&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;X&lt;/td&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;X&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;No matter how much cybersecurity training you provide employees, the more complex and convoluted security measures become, the more likely they are to bypass them. &lt;a href="/resources/v/doc/ivi/2700/4e528f833de3" target="_blank"&gt;Sixty-nine percent&lt;/a&gt;&amp;nbsp;of end users&amp;nbsp;report struggling to navigate overly convoluted and complex security measures. Such dissatisfied users are prone to distribute data over unsecured channels, prevent&amp;nbsp;the installation&amp;nbsp;of security updates and deploy shadow IT.&lt;/p&gt;

&lt;p&gt;That seems to leave IT leaders with an impossible choice: improve&amp;nbsp;digital employee experience (DEX)&amp;nbsp;at the cost of security or prioritize security over experience? The truth is,&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/five-reasons-digital-employee-experience-management-dex-is-essential-to-your-business"&gt;security and DEX are equally important to an organization’s success&lt;/a&gt;&amp;nbsp;and resilience. In fact, according to&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-requirements-ebook"&gt;research from Enterprise Management Associates (EMA)&lt;/a&gt;, reducing security friction leads to far fewer breach events.&lt;/p&gt;

&lt;p&gt;So what do you do? Ivanti’s&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;2022 Digital Employee Experience Report&lt;/a&gt;&amp;nbsp;indicates IT leaders&amp;nbsp;—&amp;nbsp;with support from the C-suite&amp;nbsp;—&amp;nbsp;need to put their efforts toward providing a secure-by-design&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-digital-experience"&gt;digital employee experience&lt;/a&gt;. While that once may have seemed like an impossible task, it’s now easier than ever thanks to an emerging market for&amp;nbsp;&lt;a href="https://www.gartner.com/reviews/market/dex-tools" rel="noopener" target="_blank"&gt;DEX tools&lt;/a&gt;&amp;nbsp;that help you measure and continuously improve employees’ technology experience.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read the&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;2022 Digital Employee Experience Report&lt;/a&gt;&amp;nbsp;to&amp;nbsp;learn more about the role DEX plays in cybersecurity.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;One area in which organizations can easily improve both security and employee experience is authentication. Annoying and inefficient to remember, enter and reset, passwords have long been the bane of end users.&lt;/p&gt;

&lt;p&gt;On top of that, they’re extremely unsecure. Roughly half of the 4,291 data breaches not involving internal malicious activity analyzed for the&amp;nbsp;&lt;a href="https://www.verizon.com/business/resources/reports/dbir/" rel="noopener" target="_blank"&gt;2023 Verizon DBIR&lt;/a&gt; were enabled through credentials — about four times the amount enabled by phishing — making them by far the most popular path into an organization’s IT estate.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.g2.com/categories/passwordless-authentication" rel="noopener" target="_blank"&gt;Passwordless authentication software&lt;/a&gt;&amp;nbsp;solves this problem. If you’d like to improve&amp;nbsp;end user&amp;nbsp;experience and reduce your attack surface in one fell swoop, deploy a&amp;nbsp;&lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;passwordless authentication solution&lt;/a&gt;&amp;nbsp;that uses&amp;nbsp;&lt;a href="https://fidoalliance.org/fido2/" rel="noopener" target="_blank"&gt;FIDO2&lt;/a&gt;&amp;nbsp;authentication protocols. Both you and your users will rejoice when you can say goodbye to passwords written on Post-it Notes forever.&lt;/p&gt;

&lt;p&gt;For more guidance on&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/how-to-balance-security-with-dex-for-a-critical-advantage"&gt;how to balance security with DEX&lt;/a&gt;, refer to the following resources:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2734/f6efbc801083"&gt;Getting Started with DEX eBook&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;Gartner® Market Guide for DEX&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-solutions-ebook"&gt;Effective Solutions for Digital Experience Management (DEX)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-requirements-ebook"&gt;Evolving Requirements for Digital Experience Management (DEX)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/webinars/2023/a-step-by-step-guide-to-planning-and-measuring-digital-employee-experience-dex"&gt;A step‑by‑step guide to planning and measuring digital employee experience (DEX) on-demand webinar&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/webinars/2022/building-a-business-case-for-a-digital-employee-experience-dex-initiative"&gt;Building a business case for a digital employee experience (DEX) initiative on-demand webinar&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Additional guidance from free resources&lt;/h2&gt;

&lt;p&gt;Ivanti’s suggested best practices for reducing your attack surface combine learnings from our firsthand experience plus secondhand knowledge gleaned from authoritative resources.&lt;/p&gt;

&lt;p&gt;And while these best practices will indeed greatly diminish the size of your attack surface, there’s no shortage of other steps an organization could take to combat the ever-expanding size and complexity of modern attack surfaces.&lt;/p&gt;

&lt;p&gt;Check out the following free resources&amp;nbsp;—&amp;nbsp;some of which were referenced above&amp;nbsp;—&amp;nbsp;for additional guidance on shrinking your attack surface:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="/resources/v/doc/ivi/2720/1d4f07f60f8c" target="_blank"&gt;2023 Cyberstrategy Tool Kit for Internal Buy-In&lt;/a&gt;&amp;nbsp;from Ivanti in collaboration with&amp;nbsp;&lt;a href="https://cybersecurityworks.com" rel="noopener" target="_blank"&gt;Cyber Security Works (CSW)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight" rel="noopener" target="_blank"&gt;Australian Cyber Security Center (ACSC) Essential 8&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisa.gov/downloading-and-installing-cset" rel="noopener" target="_blank"&gt;CISA Cyber Security Evaluation Tool (CSET)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2747/a856c631661d"&gt;Ivanti Government Cybersecurity Status Report&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022L2555&amp;amp;from=EN" rel="noopener" target="_blank"&gt;NIS2 (Directive (EU) 2022/2555)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener" target="_blank"&gt;NIST Cybersecurity Framework (CSF)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/publications/zero-trust-architecture" rel="noopener" target="_blank"&gt;NIST Special Publication&amp;nbsp;800–207&amp;nbsp;– Zero Trust Architecture&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Next steps&lt;/h2&gt;

&lt;p&gt;So, you’ve implemented all the best practices above and you’re wondering what’s next. As with all things cybersecurity, there’s no time for standing still. &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;Attack surfaces require constant monitoring&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;You never know when the next unmanaged BYOD device will connect to your network, the next vulnerability in your CRM software will be exploited or the next employee will forget their iPhone at the bar after a team happy hour.&lt;/p&gt;

&lt;p&gt;On top of tracking existing attack vectors, you also need to stay informed about emerging ones. For example, the&amp;nbsp;recent explosion of AI models is driving substantial attack surface growth, and it’s safe to say more technologies that open the door to your IT environment are on the horizon.&amp;nbsp;Stay vigilant.&lt;/p&gt;
</description><pubDate>Tue, 20 Jun 2023 14:32:34 Z</pubDate></item><item><guid isPermaLink="false">5389011e-5fbf-4916-b11f-3c478200e666</guid><link>https://www.ivanti.com/blog/extend-microsoft-intune-with-risk-based-third-party-patch-publishing</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><category>Patch Management</category><title>Extend Microsoft Intune with Risk-Based Third-Party Patch Publishing</title><description>&lt;p&gt;Data breaches and ransomware attacks are increasing exponentially. The &lt;a href="https://www.idtheftcenter.org/publication/2021-annual-data-breach-report-2/" rel="noopener" target="_blank"&gt;number of data breaches reported per year&lt;/a&gt; has increased nearly 70% in the past five years. &lt;a href="https://www.extrahop.com/resources/papers/cyber-confidence-index-2022/" rel="noopener" target="_blank"&gt;Eighty-five percent of IT decision makers report&lt;/a&gt; having suffered at least one ransomware attack over the same period. Organizations that fall victim to these breaches and attacks experience system downtime, damaged reputations, IP loss and other ill effects that lead to lost business. On top of that, they also face costs associated with detecting and responding to the breaches and attacks, notifying data subjects, data protection regulators and other third parties, and response activities after the breaches and attacks have been carried out, such as paying out compensation for victims and regulatory fines.&lt;/p&gt;

&lt;p&gt;Also increasing over the past five years is the number of applications organizations deploy. &lt;a href="https://www.okta.com/businesses-at-work/" rel="noopener" target="_blank"&gt;Reports show&lt;/a&gt; the average number of applications deployed at organizations has increased 24% in that span, with much of that growth being fueled by the accelerated digital transformation of the Everywhere Workplace. It should therefore come as no surprise that third-party applications have become one of the most attractive attack vectors for cyber adversaries. Unfortunately, &lt;a href="https://www.ibm.com/account/reg/us-en/signup?formid=urx-50915" rel="noopener" target="_blank"&gt;data breaches stemming from vulnerabilities in third-party applications&lt;/a&gt; are also among the most expensive and elusive, costing an average of $4.33M and taking an average of 286 days to identify and contain – meaning a breach occurring on January 1 would typically not be contained until October 13.&lt;/p&gt;

&lt;p&gt;All this means organizations need to be diligent about updating their third-party applications, which can be challenging given the ever-increasing number of applications they must account for. Further complicating matters is the growing number of vulnerabilities to account for – &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;an average of 61 are disclosed&lt;/a&gt; by the National Vulnerability Database (NVD) every day. On top of that, many IT teams find themselves struggling to retain talent and burdened with inadequate tooling. It’s no wonder that &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;71% of IT and security professionals&lt;/a&gt; find patching to be overly complex and time-consuming and &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;53% spend most of their time&lt;/a&gt; organizing and prioritizing vulnerabilities.&lt;/p&gt;

&lt;p&gt;The good news is that organizations do not need to patch every vulnerability. In fact, &lt;a href="https://cyber.dhs.gov/bod/22-01/" rel="noopener" target="_blank"&gt;only 4% of all Common Vulnerabilities and Exposures (CVEs)&lt;/a&gt; have been publicly exploited. The bad news is that identifying that 4% from the over 130,000 total vulnerabilities in the NVD is difficult for many organizations. Much of that difficulty is driven by deficiencies with traditional approaches to vulnerability prioritization and remediation that leave organizations exposed to a huge attack window:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Patching only critical vulnerabilities based on the Common Vulnerability Scoring System (CVSS) v3 would cause an organization to miss out on patching &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;73.61% of ransomware vulnerabilities&lt;/a&gt; – a major gap for the &lt;a href="https://l.vulcancyber.com/hubfs/Infographics/Vulcan_2021-11-22_How%20are%20Cyber%20Security%20Teams%20Prioritizing%20Vulnerability%20Risk_v1.pdf?__hstc=19072423.7bc7838d05c2728b86636a0bea8443d0.1647871270129.1647871270129.1647871270129.1&amp;amp;__hssc=19072423.2.1647871270129&amp;amp;__hsfp=3443379079&amp;amp;_ga=2.193475439.317862248.1647871269-1484263879.1647871269" rel="noopener" target="_blank"&gt;71% of IT and security decision makers&lt;/a&gt; that use the CVSS to score and prioritize vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Patching only new vulnerabilities is similarly insufficient, as &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;91% of current ransomware vulnerabilities&lt;/a&gt; were identified before 2021.&lt;/li&gt;
	&lt;li&gt;Patching vulnerabilities only after they have been disclosed in the NVD is also a problem, as there is average &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;latency of 13.7 days&lt;/a&gt; between the time a vendor publishes a ransomware vulnerability and the time of NVD disclosure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This situation can be even more problematic for the many organizations that use Microsoft Intune to deliver applications and updates to their devices. While Intune offers comprehensive patch management capabilities for Microsoft applications, it provides no native functionality for updating third-party applications. Intune customers thus must rely heavily on manual processes or standalone patch management tools to keep their third-party applications updated. While these tools automate many aspects of the patch management lifecycle, most do not integrate directly with Intune or help IT teams properly prioritize vulnerabilities for remediation.&lt;/p&gt;

&lt;h2&gt;Introducing Ivanti Neurons Patch for MEM&lt;/h2&gt;

&lt;p&gt;Organizations invested in Microsoft Intune clearly need a better way to prioritize and deploy updates for their third-party applications – one that will both increase their level of protection against data breaches and ransomware attacks and decrease the strain on their IT teams. Ivanti Neurons Patch for MEM (Microsoft Endpoint Manager) is the answer.&lt;/p&gt;

&lt;h3&gt;Extend Microsoft Intune with third-party patch publishing&lt;/h3&gt;

&lt;p&gt;Organizations can maximize the return on their Intune investment while protecting against threats that stem from vulnerabilities in third-party applications with Ivanti Neurons Patch for MEM. From Ivanti’s Neurons cloud platform, Ivanti Neurons Patch for MEM publishes pre-tested third-party application updates directly to Intune. This enables IT teams to deploy third-party application updates alongside their Microsoft OS and application updates within Intune as part of their existing application lifecycle management workflows.&lt;/p&gt;

&lt;h3&gt;Proactively protect against active exploits&lt;/h3&gt;

&lt;p&gt;Ivanti Neurons Patch for MEM provides intelligence on known exploits and threat-context for vulnerabilities – including ties to ransomware – enabling organizations to prioritize remediation based on adversarial risk. Additionally, Ivanti’s Vulnerability Risk Rating (VRR) better arms IT teams to take risk-based prioritized action than basic CVSS scoring by taking in the highest fidelity vulnerability and threat data plus human validation of exploits from penetration testing teams.&lt;/p&gt;

&lt;h3&gt;Avoid failed patch deployments&lt;/h3&gt;

&lt;p&gt;Pre-tested patches and patch reliability insights in Ivanti Neurons Patch for MEM help organizations save time and avoid failed patch deployments. Ivanti thoroughly tests each patch content package we create. Testing is conducted in an extensive virtual environment to ensure the packages work across a wide array of application versions and operating systems before they are released to the product.&lt;/p&gt;

&lt;p&gt;In addition, patch reliability insights from crowdsourced social sentiment data and anonymized patch deployment telemetry enable IT teams to evaluate patches based on their reliability in real-world environments before deploying them.&lt;/p&gt;

&lt;h3&gt;Streamline patch management processes&lt;/h3&gt;

&lt;p&gt;By providing the option to automatically publish third-party application updates into Intune for deployment as they come available, Ivanti Neurons Patch for MEM saves users time and effort and enables them to conduct most of their patch management activities directly within Intune. The pre-tested application updates in the solution’s patch catalog coupled with patch reliability insights save organizations additional time by helping them achieve more reliable patching with fewer failures.&lt;/p&gt;

&lt;p&gt;The threat intelligence in Ivanti Neurons Patch for MEM helps further streamline patch management processes. For starters, this intelligence improves operational efficiencies by enabling IT teams to effectively prioritize patch efforts so they focus only on what matters. Additionally, available exploit and malware insight helps facilitate data and risk conversations between security and IT operations teams to improve operational collaboration.&lt;/p&gt;

&lt;h3&gt;Continue transition to modern management&lt;/h3&gt;

&lt;p&gt;Gartner has estimated &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences" rel="noopener" target="_blank"&gt;over 85% of organizations&lt;/a&gt; will embrace a cloud-first principle by 2025 and will be unable to fully execute their digital strategies without utilizing cloud-native architectures and technologies. As a cloud-native solution, Ivanti Neurons Patch for MEM enables Intune customers to migrate their patching workloads entirely to the cloud without any additional infrastructure. Intune and Ivanti Neurons Patch for MEM combine to create a cloud-only solution that requires no on-premises infrastructure on either the Microsoft or Ivanti side.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons Patch for MEM also enables &lt;a href="https://www.ivanti.com/products/patch-for-configuration-manager"&gt;Ivanti Patch for MEM&lt;/a&gt; customers to progress from on-premises third-party patch management to the cloud.&lt;/p&gt;

&lt;h2&gt;Ivanti resources&lt;/h2&gt;

&lt;p&gt;Check out the Ivanti Neurons Patch for MEM &lt;a href="https://www.ivanti.com/products/ivanti-neurons-patch-for-intune"&gt;product page&lt;/a&gt; for more information on this cloud-native third-party patch management solution.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 22 Apr 2022 16:53:38 Z</pubDate></item><item><guid isPermaLink="false">fbad3040-bab6-43e2-aadf-4a0f7f39b7a2</guid><link>https://www.ivanti.com/blog/evolve-to-a-risk-based-vulnerability-remediation-strategy-with-a-cloud-native-patch-management-solution-now-available-from-ivanti</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robert-waters</atom:uri></atom:author><category>Patch Management</category><title>Evolve to a Risk-Based Vulnerability Remediation Strategy with a Cloud-Native Patch Management Solution – Now Available from Ivanti</title><description>&lt;p&gt;Ransomware&amp;nbsp;attacks&amp;nbsp;are increasing in frequency&amp;nbsp;and severity&amp;nbsp;every year.&amp;nbsp;The impact to&amp;nbsp;companies&amp;nbsp;is&amp;nbsp;devastating.&amp;nbsp;These&amp;nbsp;attacks typically lead to lost business for companies&amp;nbsp;as they&amp;nbsp;often&amp;nbsp;cause&amp;nbsp;increased customer turnover,&amp;nbsp;system&amp;nbsp;downtime, diminished&amp;nbsp;reputation&amp;nbsp;and other adverse side effects.&amp;nbsp;On top of that,&amp;nbsp;there are also costs associated with&amp;nbsp;detecting and escalating a ransomware breach,&amp;nbsp;notifying data subjects, data protection regulators and other third parties, and&amp;nbsp;post-breach response&amp;nbsp;activities,&amp;nbsp;such as&amp;nbsp;paying&amp;nbsp;out&amp;nbsp;compensation for victims and regulatory fines.&amp;nbsp;&lt;a href="https://www.ibm.com/downloads/cas/OJDVQGRY" rel="noopener" target="_blank"&gt;Research&lt;/a&gt;&amp;nbsp;puts the average total cost of a ransomware breach at $4.62 million&amp;nbsp;–&amp;nbsp;excluding&amp;nbsp;the cost of&amp;nbsp;the&amp;nbsp;ransom.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Unfortunately, the situation&amp;nbsp;is likely to get worse before it gets better. &lt;a href="https://www.coveware.com/blog/2021/10/20/ransomware-attacks-continue-as-pressure-mounts" rel="noopener" target="_blank"&gt;Reports show&lt;/a&gt; fewer than 20 arrests were made globally&amp;nbsp;in connection with ransomware attacks&amp;nbsp;in 2020,&amp;nbsp;despite the fact there were an estimated 25,000 attacks of impact in the same year&amp;nbsp;– a ratio&amp;nbsp;that&amp;nbsp;is hardly a deterrent for would-be ransomware actors.&amp;nbsp;In addition, the barriers to entry&amp;nbsp;to becoming a ransomware actor are eroding as well.&amp;nbsp;Ransomware as a service (RaaS) enables just about anyone to&amp;nbsp;get in on the action – no&amp;nbsp;security&amp;nbsp;knowledge or coding expertise required.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Furthermore,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/white-papers/spotlight_ransomware2021_risksensecsw?_ga=2.114312003.538830105.1638796042-898995573.1638285247"&gt;research from Ivanti&lt;/a&gt;&amp;nbsp;shows&amp;nbsp;the number of&amp;nbsp;Common Vulnerabilities and Exposures&amp;nbsp;(CVEs)&amp;nbsp;into networks nearly quadrupled in 2020&amp;nbsp;alone.&amp;nbsp;And to top it all off,&lt;a href="https://www.coveware.com/blog/2021/10/20/ransomware-attacks-continue-as-pressure-mounts" rel="noopener" target="_blank"&gt;&amp;nbsp;other research&amp;nbsp;i&lt;/a&gt;ndicates&amp;nbsp;ransomware attackers&amp;nbsp;are increasingly targeting&amp;nbsp;midmarket&amp;nbsp;companies&amp;nbsp;to avoid&amp;nbsp;the media attention that comes&amp;nbsp;from&amp;nbsp;attacking&amp;nbsp;large enterprises. It seems no one is safe,&amp;nbsp;and there’s nowhere to hide.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Until ransomware attacks and other data breaches are a thing of the past&amp;nbsp;– a day that may never come based on&amp;nbsp;their current trajectory –&amp;nbsp;organizations must take steps to protect against them.&amp;nbsp;Patching to&amp;nbsp;fix CVEs&amp;nbsp;is one of the best things an organization can do to counter ransomware attacks. &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;Unfortunately,&amp;nbsp;research from Ivanti&amp;nbsp;shows&lt;/a&gt;&amp;nbsp;71%&amp;nbsp;of IT and security professionals find patching to be overly complex and time-consuming.&amp;nbsp;That may be&amp;nbsp;due to the overwhelming volume of vulnerabilities&amp;nbsp;that exist.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are well over 100,000 vulnerabilities listed in the&amp;nbsp;US National Vulnerability Database (NVD).&amp;nbsp;While only a small percentage of those vulnerabilities are tied to ransomware, and an even smaller percentage are trending/active exploits,&amp;nbsp;identifying which ones pose&amp;nbsp;the most&amp;nbsp;risk&amp;nbsp;to an organization&amp;nbsp;can be tricky.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/white-papers/spotlight_ransomware2021_risksensecsw?_ga=2.114312003.538830105.1638796042-898995573.1638285247"&gt;A&amp;nbsp;report from Ivanti&amp;nbsp;shows&lt;/a&gt; that from 2018-2020, using CVSS v3 scoring, if&amp;nbsp;an organization were to patch only critical vulnerabilities, its coverage against ransomware would only be about 35%.&lt;/p&gt;

&lt;h2&gt;Introducing Ivanti Neurons for Patch Management&lt;/h2&gt;

&lt;p&gt;To address the ever-increasing&amp;nbsp;number of&amp;nbsp;vulnerabilities&amp;nbsp;and&amp;nbsp;exploits&amp;nbsp;with the limited resources they have,&amp;nbsp;IT organizations need to evolve to a risk-based vulnerability remediation strategy.&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt;&amp;nbsp;enables them to do just that.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;cloud-native&amp;nbsp;patch management solution provides actionable threat intelligence, patch reliability insight and device risk visibility that enables IT teams to prioritize and remediate the&amp;nbsp;vulnerabilities that pose the most danger to their organization.&amp;nbsp;By leveraging Ivanti Neurons for Patch Management to increase the efficiency and effectiveness of their patching efforts, organizations can better protect themselves from data breaches, ransomware and other threats that stem from software vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The&amp;nbsp;patch management capabilities&amp;nbsp;in Ivanti Neurons for Patch Management&amp;nbsp;enable this protection along with&amp;nbsp;other&amp;nbsp;benefits for companies seeking a cloud-native patch management solution.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Proactively patch against active exploits&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Ivanti Neurons for Patch Management&amp;nbsp;provides&amp;nbsp;intelligence on&amp;nbsp;known&amp;nbsp;exploits and threat-context for vulnerabilities – including&amp;nbsp;ties to&amp;nbsp;ransomware&amp;nbsp;– enabling&amp;nbsp;organizations to prioritize remediation based on adversarial risk.&amp;nbsp;Additionally,&amp;nbsp;Ivanti’s Vulnerability Risk Rating (VRR) better arms&amp;nbsp;IT teams&amp;nbsp;to take &lt;a href="https://www.ivanti.com/blog/how-implementing-risk-based-patch-management-prioritizes-active-exploits"&gt;risk-based prioritized action&lt;/a&gt; than CVSS scoring by taking in the highest fidelity vulnerability and threat data plus human validation of exploits from penetration testing teams.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="screenshot: docker for windows stable 4.3.2.0" src="https://static.ivanti.com/sites/marketing/media/images/blog/inpi-1.jpg"&gt;
&lt;figcaption&gt;Actionable intelligence on a CVE with ties to ransomware&amp;nbsp;&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h3&gt;Achieve faster SLAs with patch reliability and trending insight&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Patch reliability insights from crowdsourced social sentiment data and anonymized patch deployment telemetry in Ivanti Neurons for Patch Management&amp;nbsp;helps organizations save time and avoid failed patch deployments.&amp;nbsp;This information enables&amp;nbsp;IT teams&amp;nbsp;to evaluate patches based on their reliability in real-world applications before deploying them. Additionally, service-level agreement (SLA) tracking, which provides visibility into devices nearing SLA, enables&amp;nbsp;IT teams&amp;nbsp;to&amp;nbsp;take action&amp;nbsp;on devices before they are out of compliance.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="screenshot: patch intelligence dashboard" src="https://static.ivanti.com/sites/marketing/media/images/blog/inpi-5.jpg"&gt;
&lt;figcaption&gt;Actionable intelligence on a CVE with ties to ransomware&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h3&gt;Transition from on-premises to cloud patch management&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences" rel="noopener" target="_blank"&gt;Gartner has estimated&lt;/a&gt;&amp;nbsp;over 85% of organizations will embrace a cloud-first principle by 2025 and will be unable to fully execute their digital strategies without utilizing cloud-native architectures and technologies.&amp;nbsp;While&amp;nbsp;cloud migration&amp;nbsp;is important,&amp;nbsp;it can be complex, and&amp;nbsp;most companies are not prepared&amp;nbsp;to&amp;nbsp;migrate&amp;nbsp;critical on-premises&amp;nbsp;applications&amp;nbsp;overnight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Patch Management is a cloud-native solution that allows&amp;nbsp;organizations&amp;nbsp;to transition from on-prem patch management to the cloud at&amp;nbsp;their&amp;nbsp;own pace instead of being forced to “rip and replace.” Such gradual transitions are enabled by the solution’s single pane of glass experience that provides visibility into the devices that it manages in the cloud alongside those managed via on-prem Ivanti patch management solutions.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="screenshot: endpoint vulnerability" src="https://static.ivanti.com/sites/marketing/media/images/blog/inpi-3.jpg"&gt;
&lt;figcaption&gt;A single pane of glass experience provides visibility into devices managed in the cloud and on-premises&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h3&gt;Streamline patch management processes&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;By&amp;nbsp;providing visibility into all the endpoints in an organization’s environment via a single pane of glass, Ivanti Neurons for Patch Management improves operational efficiencies&amp;nbsp;by eliminating the need to jump between siloed patch management solutions. Advanced vulnerability insights and patch intelligence&amp;nbsp;in the solution&amp;nbsp;further improve operational efficiencies by enabling&amp;nbsp;IT teams&amp;nbsp;to effectively prioritize patch efforts so&amp;nbsp;they&amp;nbsp;focus only on what matters. Further, when it’s time to patch, autonomous Patch Configurations deployed to the Ivanti Neurons Agent on devices distribute thoroughly tested patches to thousands of machines in minutes.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="screenshot: endpoint vulnerability" src="https://static.ivanti.com/sites/marketing/media/images/blog/inpi-4.jpg"&gt;
&lt;figcaption&gt;Advanced vulnerability insights help prioritize patch efforts&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Ivanti Resources&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Check out the Ivanti Neurons for Patch Management&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;&amp;nbsp;product page&amp;nbsp;&lt;/a&gt;and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2652/9e36fad9c3df"&gt;datasheet&lt;/a&gt;&amp;nbsp;for more information on this cloud-native patch management solution.&amp;nbsp;For a&amp;nbsp;deeper dive on the solution,&amp;nbsp;&lt;a href="https://www.ivanti.com/lp/security/demos/ivanti-neurons-for-patch-management"&gt;book&amp;nbsp;a demo&amp;nbsp;&lt;/a&gt;with&amp;nbsp;one of Ivanti’s subject matter experts.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Tue, 25 Jan 2022 13:00:06 Z</pubDate></item></channel></rss>