-
Report details
-
13
Figures
-
0
Tables
-
2
Executive Summary
-
4
Introduction
-
24
Research Findings
-
3
Security Hygiene and Posture Management Remains One of the Least Mature Areas…
-
10
The External Attack Surface Is Vulnerable and Prone to Exploitation
-
1
Asset Management Depends Upon Tools, Processes, and Cross-department Cooperation
-
3
Organizations Believe Their Vulnerability Management Programs Are Mature, but…
-
3
While the Value of Security Testing Is Well Understood, Frequency and Depth Rema…
-
4
Organizations Will Move Toward Security Observability, Prioritization, and Valid…
-
4
Conclusion
-
1
Research Methodology
-
Respondent Demographics
|
ESG Research Report: Security Hygiene and Posture Management
Jan 24, 2022
by
Bill Lundell, Jon Oltsik
Security posture management challenges are driven by the growing attack surface. Organizations have accelerated cloud computing initiatives and have been forced to support a growing population of remote users because of the pandemic. Firms are also deploying new types of devices as part of digital transformation initiatives, further exacerbating the growing attack surface, which leads to management challenges, vulnerabilities, and potential system compromises. Meanwhile, security teams are also concerned about recent cybersecurity issues including MS Exchange vulnerabilities, the SolarWinds hack, and the recent Log4j zero-day flaw. As a result, organizations are further assessing security posture management processes, examining vendor risk management requirements, and testing security more frequently.
Page Count: 32
Table of Contents
-
Executive Summary
(2)
-
Introduction
(4)
-
Research Findings
(24)
-
Security Hygiene and Posture Management Remains One of the Least Mature Areas of Cybersecurity
(3)
-
The External Attack Surface Is Vulnerable and Prone to Exploitation
(10)
-
Asset Management Depends Upon Tools, Processes, and Cross-department Cooperation
(1)
-
Organizations Believe Their Vulnerability Management Programs Are Mature, but There Is Still Work to Be Done
(3)
-
While the Value of Security Testing Is Well Understood, Frequency and Depth Remain Underserved
(3)
-
Organizations Will Move Toward Security Observability, Prioritization, and Validation (SOPV) Technologies
(4)
-
Conclusion
(4)
-
Research Methodology
(1)
-
Respondent Demographics
|
Other Users Also Viewed
Oct 24, 2022
Based upon years of previous research, for most organizations, security operations are in a period of both disarray and transition. While organizations expand the development of digital transformation initiatives, cloud-native application development…
|