• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Why Adopt Risk-Based Vulnerability Management Approaches

by CXO Staff
November 29, 2020
in Opinions

Adam Palmer highlights key reasons why it is necessary for organisations to embrace risk-based vulnerability management approaches

Why Adopt Risk-Based Vulnerability Management Approaches
Adam Palmer, Tenable
Adam Palmer, Tenable

Organisations have embraced cloud-based technologies to support a distributed workforce, particularly during the current health crisis. These new technologies are mixed with traditional IT systems rife with data silos and outdated operational processes. The challenge is that legacy security approaches weren’t designed to handle an attack surface of this size and complexity. And the results are evident as, according to a recent study conducted by Forrester Consulting on behalf of Tenable, 94 percent of global organisations suffered at least one business-impacting cyberattack in the last 12 months.

While it might feel insurmountable, the majority of cyberattacks can be traced back to unfixed, yet known vulnerabilities. To put things into perspective, there were 17,313 new vulnerabilities disclosed in 2019 — yet attackers leveraged only a small subset of these for attacks.

Security teams need to focus on the vulnerabilities that affect critical assets first, instead of being distracted by those that are unlikely to be exploited nor pose a significant threat to the business’’ ability to function.

Here are five reasons organisations should adopt a risk-based approach to vulnerability management (RBVM):

Context Based Decisions

Correlate and analyse essential vulnerability characteristics along with other key contextual elements, including the criticality of the assets affected, threat and exploit intelligence. Organisations can also conduct an assessment with a view of current and likely future attacker activity. This helps organisations understand the actual business risk posed by each vulnerability.

Don’t Get Distracted

Prioritising remediation efforts using the common vulnerability scoring system (CVSS) alone isn’t enough. This is because CVSS is limited to a theoretical view of the risk a vulnerability could potentially introduce, rather than the actual risk it poses to the organisation. CVSS doesn’t take into account whether the vulnerability is being exploited in the wild, or if the vulnerability impacts a business-critical service or system.

Risk-based vulnerability management helps organisations understand all vulnerabilities in the context of business risk so that data can be used to prioritise remediation efforts. The ability to do so empowers security teams to move beyond the inherent problems of using CVSS in isolation. Instead, they can address true business risk as opposed to wasting valuable time chasing vulnerabilities that have a low likelihood of being exploited.

See Everything

Organisations need to be able to assess modern assets, as well as traditional on-premises IT environments, to eliminate the blind spots that plague legacy tools. By having visibility into the entire attack surface, security teams can determine which vulnerabilities to prioritise for remediation based on risk – regardless of where they reside in the network. 

Strategic and Purposeful

By limiting assessments to assets that fall within the audit scope can cause critical systems to be ignored. Instead, continuously discover and assess the risk associated with all business-critical assets across the attack surface. Security teams should also employ analytics that dynamically assess changes in vulnerability, threat and asset criticality data to determine risks in real-time.

Keep Disruption To a Minimum

By leveraging machine learning and artificial intelligence, to instantaneously digest feeds from various sources, security teams can build a picture of the enterprise that focuses on the business’ critical assets and the actual threat they face. These insights empower security teams to adjust their remediation strategy in near real-time. This proactively addresses the vulnerabilities that pose the most risk to the organisation, while minimising disruptions from new vulnerabilities and zero-day exploits that gain media attention.

Tags: Adam PalmercyberattacksCybersecurityfeaturedriskSecurityTenablevulnerability management
ShareTweet

Related Posts

Empowering the UAE’s digital future through data sovereignty
Opinions

Empowering the UAE’s digital future through data sovereignty

As the UAE continues to lead the charge in technological innovation, the importance of data sovereignty has never been more...

May 26, 2025
AI agents are set to become an indispensable part of the GCC security apparatus
Opinions

AI agents are set to become an indispensable part of the GCC security apparatus

Middle Eastern countries continue to bet big on AI—and for good reason. National strategies like the UAE Artificial Intelligence Strategy...

May 23, 2025

Discussion about this post

Latest Issue

CVC Joins CD&R as an Investment Partner in Epicor

VAST Data and Cisco expand partnership

June 4, 2025
JAGGAER appoints first Chief Digital & AI Officer

JAGGAER appoints first Chief Digital & AI Officer

June 4, 2025
training skills ups killing

Huawei partners with Nafis to launch Emirati Talent Development Programme

June 4, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.