HomeSecurity ArchitectureTime frames for attacks are diminishing quickly. Here’s how cyber teams can...

Time frames for attacks are diminishing quickly. Here’s how cyber teams can handle it.

Published on

spot_img

The issue of cross-team cooperation in addressing cybersecurity threats is becoming increasingly complex, as different tools used to classify the severity of threats often contradict each other. According to Tamnoon, a cloud security vendor, CNAPP tools have been found to label the same potential threat differently, with one tool deeming it as “informational” while another identifies it as a critical issue. This discrepancy has led to organizations struggling to prioritize and manage the overwhelming volume of critical alerts, resulting in alerts remaining unresolved for extended periods of time.

The growing complexity of software has also contributed to longer resolution times for fixing flaws. Veracode’s report reveals that the time taken to address software flaws has increased by 47% since 2020, and the number of applications containing high severity flaws has nearly tripled in the same period. While identifying flaws has become easier with advanced technology, the real challenge lies in fixing them, as stated by the report authors.

To address these challenges, experts recommend carrying out more frequent application testing and scanning, in addition to providing comprehensive security training to analysts. Another proposed solution is to focus on reducing overall security debt within organizations, which involves continuously improving code quality and actively searching for vulnerabilities.

By implementing these strategies, organizations can enhance their cybersecurity posture and reduce the risk of falling victim to cyber threats. It is crucial for all stakeholders to work together cohesively and leverage the latest technologies and practices to stay ahead of increasingly sophisticated cyber threats.

Source link

Latest articles

MDIRSS retrieves stolen funds exceeding $1 million in cybercrime incident

Bar Harbor, Maine - In a recent update from Mount Desert Islander, it has...

Bastille, a Wireless Airspace Defense Firm, Unveils Key Threats for 2025

Wireless airspace defense firm Bastille recently released a report detailing the top threats facing...

Is Security Human Factors Research Biased Towards Western Ideals and Practices? – Source: www.schneier.com

A recent study titled "How WEIRD is Usable Privacy and Security Research?" conducted by...

Winning at SAML roulette: the hacker’s advantage

In a recent development, researchers have unveiled a groundbreaking method to exploit round-trip attacks...

More like this

MDIRSS retrieves stolen funds exceeding $1 million in cybercrime incident

Bar Harbor, Maine - In a recent update from Mount Desert Islander, it has...

Bastille, a Wireless Airspace Defense Firm, Unveils Key Threats for 2025

Wireless airspace defense firm Bastille recently released a report detailing the top threats facing...

Is Security Human Factors Research Biased Towards Western Ideals and Practices? – Source: www.schneier.com

A recent study titled "How WEIRD is Usable Privacy and Security Research?" conducted by...