Comprehensive software reviews to make better IT decisions
Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
A combination of better adherence to best practices and use of monitoring programs and new tools in vulnerability and patch management is forcing attackers to change their tactics. Awareness of security and observation of a company’s network is on the rise, decreasing open attack vectors for attackers.
Source: SoftwareReviews Product Scorecard, Accessed May 11, 2020.
However, data pulled from hundreds of penetration tests conducted by Rapid7 have shown that even with improvement, businesses are still failing basic security practices. Patch management, password quality, and a lack of visibility remain common problems for businesses. In 72% of their penetration tests, Rapid7 was able to gather user credentials through standard password spraying. While this is serious, the testers were unable to break the boundary between the external and internal networks. Implementation of network segmentation has prevented these credential losses from becoming an extreme security threat, showing promise for the future of security adherence.
The consensus from the hundreds of penetration tests conducted by Rapid7 is that businesses are slowly getting better at securing their networks, but they can still encounter issues with the basics. Chris Nickerson, CEO at Lares, another penetration testing firm, notes that tooling debt is an overarching problem. Over the years organizations have spent a great deal of money on security tools, adding and discarding them as the business changes. This creates a problem in which organizations will often have multiple poorly integrated tools with no oversight or cohesive strategy.
These continual changes in a program library can be a net negative for the security side of the business, making it hard for consistency and business customization to stay in effect. They can also lead to unpatched security systems, unsupported programs, and open vulnerabilities for the enterprise and can also make it harder to detect alerts from previous penetration tests. A solid vulnerability management suite often comes with programs that include both patch management (a noted issue) and network and inventory assessment tools. These tools can tell you exactly what is on your network, unveiling legacy programs and potential vulnerable entry points.
While businesses are doing better in efforts to secure their networks, there is always room for improvement. Consider your security program against the Rapid7’s list of identified common flaws. Locate where there is room for improvement on best practices and common vulnerabilities to ensure that you’re staying ahead of attackers.
Want to Know More?
Design and Implement a Vulnerability Management Program
Cybersecurity Priorities in Times of Pandemic
Your Internet Secret Service, Otherwise Known as External Attack Surface Management (EASM)
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.
Twilio Breach and Cloud Security
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
Remote Work Landscape Pushes Microsoft to Releases Endpoint DLP and Double Key Encryption Features for Added Data Security
Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.
IBM Raises Price on Software Support; Shoves Customers Toward the Cloud
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense Releases a Unified Infrastructure Security Risk Management Program
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
DeviceLock Acquired by Cyberprotection Vendor Acronis
To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with the increasingly prevalent role that data privacy plays in cybersecurity.
Address the Root of Your Vulnerabilities in a Resource-Tight Period
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
CORL Technologies Launches Its Vendor Risk Management Resource Center
Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to ensuring that you don’t inadvertently introduce new risks through this dynamic channel.