2016 Cybersecurity Trends Report Shows Organizations are Struggling to Identify and Correct Vulnerabilities and Misconfigurations in Virtual and Cloud Environments By CIOReview Team

2016 Cybersecurity Trends Report Shows Organizations are Struggling to Identify and Correct Vulnerabilities and Misconfigurations in Virtual and Cloud Environments

CIOReview Team | Wednesday, 26 October 2016, 08:54 IST

  •  No Image

Skybox® Security, a global leader in security analytics, released today the results of its 2016 Trends Report: Analyzing the Attack Surface. Prepared for Skybox by the research firm CyberEdge Group, the report details findings from a global survey of 275 IT professionals at enterprises and government agencies with more than 500 employees. It presents data on how IT organizations are using automated tools to identify, analyze and prioritize vulnerabilities and misconfigurations concealed on their networks — physical, virtual and cloud.

Among the key findings: organizations are least automated (and least confident) in areas related to (a) collecting data about virtual and cloud–based systems and applications and (b) analyzing and remediating firewall rules that violate policies and regulations. These are the areas, therefore, with the most room for improvement in the immediate future, especially considering that many organizations are quickly transitioning to hybrid IT networks and regulatory requirements worldwide are increasing and becoming more strict.

For example, while a near-perfect 92 percent of organizations use automated tools to detect vulnerabilities on hosts and servers, only 54 percent use automated tools to assess security controls on cloud–based systems and applications.

The data points to other areas that need improvement, particularly for tasks involving remediation and provisioning. Although most organizations automate the process of pushing patches (between 74 and 81 percent), approximately half of the organizations (between 44 and 53 percent) have primarily or completely manual processes for most other areas. This includes: remediating misconfigurations on servers and network devices, systems and data access rules, and firewall rules that violate policies; provisioning firewalls, firewall rules and security.

“The lack of an automated approach among so many organizations is alarming, especially when you consider that the industry is experiencing a severe shortage of security professionals,” said Skybox Director of Product Marketing Kevin Flynn. “And in the very near future, regulations will become more burdensome — and the consequences of not meeting those regulations more painful — so organizations should really be investigating tools that automate configuration, vulnerability and policy management.”

CIO Viewpoint

The Cyber Security Spar in Integrating IT and...

By Vimal Goel, CIO, HPCL-Mittal Energy

Towards Cyber Resilience: A Data-Centric...

By Puneet Gupta, Vice President & Managing Director, NetApp India/SAARC

Why DDoS Attacks Are on the Rise and How Can...

By Shibu Paul, Vice President – International Sales at Array Networks

CXO Insights

Emerging Trends, Challenges & Future Prospects...

By Sujoy Brahmachari, CIO & CISO, Rosmerta Technologies

Exploring Data-First Security and Automation in...

By Maheswaran S, Country Manager - S.Asia, Varonis Systems

Securing IT-OT Converged Infrastructure

By Saurabh Sharma, SMIEEE, FIE, CEH, Chief Manager (BIS) & CISO, Petronet LNG Ltd.

Facebook