• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
survey provides takeaways for security pros to operationalize their remediation

Survey Provides Takeaways for Security Pros to Operationalize their Remediation Life Cycle

You are here: Home / General Cyber Security News / Survey Provides Takeaways for Security Pros to Operationalize their Remediation Life Cycle
August 29, 2023

Talk to any security expert and they’ll convey to you that remediating pitfalls from a variety of siloed security scanning resources demands a laborous and labor-intensive collection of techniques targeted on deduplication, prioritization, and routing of issues to an acceptable “fixer” someplace in the business. This burden on already source-strapped security teams is an performance killer.

A new study, commissioned by Seemplicity and done by Dark Reading, delivers clean insight into how security execs tackle the demanding remediation lifetime cycle from discovery to resolution. The exploration reveals the obstacles security industry experts encounter when coordinating remediation activities. The details exposes the outcomes — in increased workload and diminished risk posture — that occur from lengthy remediation situations, inefficient and uncontrolled guide processes, the lack of managerial visibility and oversight throughout the risk lifestyle cycle.

Remedial OperationsRemediation Method Broken Down to Methods and Time Used on Each Move

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The survey, which encompassed 108 cybersecurity pros, at firms with 100 or a lot more staff members, uncovered that:

  • It takes nearly 4 months to remediate critical security threats from start out to end. A granular look at the conclusion-to-close risk- reduction method exhibits remediation life cycles continuously calculated in months, not times.
  • The ordinary corporation manages 3 to 5 security tools, including complexity and slowing down remediation. The knowledge clarifies that manual jobs and many feeds from disparate scanning instruments conspire to drag down velocity-to-remediation.
  • 49% of security industry experts do not know who to get hold of to deal with threats or verify fixes. Finding the right fixer, acquiring a reaction to a remediation request, and verifying productive fixes are best-time customers for most companies.
  • 97% would focus on proactive security duties if remediation was economical. Had been there superior and quicker strategies to remediate risks, respondents reported they would expend the time received on forward-seeking pursuits, this sort of as additional architecture critique, threat modeling, and security recognition instruction.

Remedial Operations

If you can find a single recurring theme in the investigation, it is that the mixture of far too lots of security tools and too a great deal handbook perform staying conducted throughout distinctive teams blocks endeavours to preserve speed with modern risk reduction and remediation workloads for the the vast majority of companies.

The “Point out of Risk Remediation” investigation supplies a roadmap for bettering effectiveness and efficiency, bolstering organizational protection, and minimizing risk — and security team’s sanity.

The report also highlights 3 important actions to strengthening risk reduction:

  • Automating risk reduction workflows will allow security groups to concentrate on strategic security initiatives. Employing judicious automation technology at every single level in the remediation course of action and throughout disparate scanning and management platforms frees groups to target on more strategic security initiatives even though also enhancing remediation performance and performance.
  • Acknowledging remediation has numerous relocating sections will lead to much more successful remediation. Productive prioritization, along with the capability to mixture congruent issues in a one remediation ticket, are key methods in producing risk remediation manageable.
  • Risk reduction workflows have to have specific security information. An automated remediation workflow tasked with organizational risk reduction is only as very good as the security abilities it’s created on.
  • Down load the complete study report “The Point out of Risk Reduction: A Require for Velocity” below.

    Uncovered this posting interesting? Observe us on Twitter  and LinkedIn to read through a lot more exclusive material we put up.


    Some pieces of this posting are sourced from:
    thehackernews.com

    Previous Post: «citrix netscaler alert: ransomware hackers exploiting critical vulnerability Citrix NetScaler Alert: Ransomware Hackers Exploiting Critical Vulnerability
    Next Post: DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates darkgate malware activity spikes as developer rents out malware to»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
    • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
    • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
    • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
    • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
    • Beyond Vulnerability Management – Can You CVE What I CVE?
    • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
    • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
    • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
    • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

    Copyright © TheCyberSecurity.News, All Rights Reserved.