Traditionally, Lee observed, there has been an internal asymmetry in investment within the security department, where vulnerability teams are underserved, while SOC teams are overwhelmed with security tools, with an average of 76 tools per company.
“But lately we’ve seen a surge of interest in cybersecurity tools for prioritizing and remediating vulnerabilities, and we expect much more to come,” she added. “Data from the Armis State of Cyber Warfare and Trends 2022-2023 report highlighted that more than 70% of IT and security professionals expect their organization to invest in vulnerability management immediately , or in the next six months.
See also: Security implications of hastily implemented AI
The traditional vulnerability management workflow, which has remained largely unchanged over the past 15 years, is no longer sufficient, Lee said.
“Vulnerability teams rely heavily on simple tools like scanners,” she added. “The advent of vulnerability prioritization and remediation promises to better address today’s landscape by allowing organizations to allocate resources more efficiently, thereby improving their security posture. »
Here are some other observations from Lee:
Over the next two years, vulnerability teams will increasingly prioritize understanding exploitability and gaining a more complete view of their risks for each asset in the environment.
“One of the fundamental changes occurring in vulnerability management is the recognition of the need for a more comprehensive understanding of risk,” she said.
See also: Process gaps a major barrier to phasing in AI, survey finds
“Instead of randomly finding and remediating CVEs without context, organizations are realizing the importance of considering asset characteristics as actionable in the equation. Questions like “Does an asset support critical business applications?” » and “Is CVE actively weaponized?” » become central to decision-making and can only be resolved by understanding the context of each asset.
As artificial intelligence grows, companies continue to strive to lay the foundation needed to derive intelligence from data, Lee observed. “In the coming year, businesses will seek a unified source of information that can become the foundation for automated orchestration and streamlined workflows, truly deliver insights and guide business decision-making.
See also: Industrial Applications of Generative AI: An eBook for a Smart Industry
“Even though AI has become the focal point of many technological advances, the reality is that for most companies, the race to deploy these technologies is not yet on,” she added. “The race is about acquiring the basics necessary to achieve this. Chief Information Security Officers (CISOs) have long talked about data-driven decisions and insights, but they still struggle to achieve it due to data fragmentation and segmented views of their environment.
Lee also predicted that in 2024, “there will be a concerted push to integrate technology solutions that bridge the gap between IT and OT in critical infrastructure, ensuring that the portion of legacy OT technology in our systems most critical assets in the company are secure and all assets are corrected. therefore.”