Data Highlights from the Report
Prioritizing risk around exploitability and criticality is a top objective.- Other top objectives include identifying known vulnerabilities and gaining a clear picture of insider threats to their attack surface.
- Only 30% of respondents have a very effective VMP.
- 36% said their program is at least somewhat effective.
- 34% responded that their VMP was not very effective at all.
- Blind spots in the attack surface limiting visibility into total risk exposure is the top challenge for security teams.
- A lack of trained staff to remediate vulnerabilities is another top challenge.
- 53% of respondents said their organization does not consume third-party threat intel, such as penetration tests, vulnerability disclosures and IP or domain reputation scores.
- 58% also do not use a risk-based rating system to prioritize vulnerabilities.
- Only 18% said vulnerabilities require remediation within 24 hours of becoming known.
- 62% of companies take 48 hours or longer — some more than two weeks —t o patch known critical vulnerabilities.
- 58% of companies that track the volume of vulnerabilities have seen them double, triple or quadruple over the past 12 months.
- 22% reported the same level of vulnerabilities. Attacks are more sophisticated than ever. More than any other characterization, companies say they are seeing an increase in the sophistication of attacks.
- Security teams are seeing more DDoS attacks.
Risk Calculates Vulnerability
Lisa Xu, NopSec chief executive, says the future of vulnerability is risk based:"I often see that, without a risk-based approach to prioritizing the ever-growing list of vulnerabilities, organizations leave themselves exposed. What this report found is that some organizations have effective ways to detect, respond to, and remediate their vulnerabilities, while other organizations have more blind spots than they think.”