Discussion about this post

User's avatar
Rick Howard's avatar

I don't disagree with the logic. But two things kept popping up in my mind while reading the essay.

#1: Organizations from small to midsize can't afford to do anything about this. They don't have the resources in terms of the people-process-technology triad. AI might help in this regard down the road but I don't see it yet.

#2: I can't recall the actual stat but successful adversary campaigns only use exploitation code like 20% of the time (check me on that number but it's not more than 40%). Addressing this issue is expensive for less than half of the attacks. What do you do for the other half if you've spent your budget on this?

Todd Inskeep's avatar

I thought Risk-Based Vulnerability Management (RBVM) had been overcome by events - namely Kenna getting bought, and I think recently going EOL.

Fixing the right vulnerabilities on the right timeline is just a huge challenge as you point out - for a lot of reasons. The 'fix' I've been focused on, especially in middle market companies is resilience and recovery (plus patching where you can).

There's also an organizational function tied to roles and responsibiliites - separating the VM identification from the pattching fix feels artificial today - 20 years ago we needed the separation for honesty and integrity. Today, and looking at the future, hiding known issues is only going to get harder in most organizations.

3 more comments...

No posts

Ready for more?