To BIA or not to BIA... revisited

To BIA or not to BIA... revisitedIn June 2017 Continuity Central published the results of a survey which looked at whether attitudes to the business impact analysis and risk assessment were changing. Two years on, we are repeating the survey to determine whether there has been any development in thinking across the business continuity profession.

Read this article


Business continuity risk assessments: is looking at likelihood a waste of time?

Charlie Maclean BristolCharlie Maclean Bristol discusses whether you should consider likelihood when conducting a risk assessment as part of the business continuity process. Do you need to know how likely it is that a threat will become an actuality; or is knowledge of the impact of the threat enough?

Read the article

IT resilience is central to a successful digital transformation

Steve BlowSteve Blow explains that while businesses must remain consistently focussed on digital transformation in order to not fall to the back of the pack, digital transformation efforts could be futile if businesses don’t address and improve their IT resilience.

Read this article.

Digital transformation: why business continuity and data security are key

Don BoxleyDon Boxley looks at some important questions that need to be asked to ensure that business continuity and data security are considered during digital transformation projects.

Read this article

Tenable, Inc., has published its latest Vulnerability Intelligence Report, which provides an overview of real-world current vulnerability trends and insights into how organizations assess and respond to new cyber risks. The research found that enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 vulnerabilities are rated as critical on the common vulnerability scoring system (CVSS) — an industry standard measurement.

The Vulnerability Intelligence Report’s findings confirm that managing vulnerabilities is a challenge of scale, volume and velocity. The Tenable Research team analysed anonymised data from 900,000 vulnerability assessments across 2,100 enterprises. The team estimates that the industry is on track to disclose up to 19,000 new vulnerabilities in 2018, an increase of 27 percent over 2017. Yet in 2017, public exploits were available for seven percent of all vulnerabilities, meaning that 93 percent of all vulnerabilities posed only theoretical risk. For most vulnerabilities, a working exploit is never developed and of those, an even smaller subset is actively weaponised by threat actors, making it difficult to understand which vulnerabilities to remediate first, if at all.

This lack of rigorous prioritisation means that organizations are struggling to assess and manage more vulnerabilities than ever and consequently, they are unable to make strategic technology decisions. For example, Adobe Flash will be unsupported from 2020 onward and is not commonly used in most enterprise environments. Yet Adobe Flash still lingers in enterprise environments and its vulnerabilities  represent half of the 20 most prevalent application vulnerabilities in enterprise environments.

“When everything is urgent, triage fails. As an industry, we need to realise that effective reduction in cyber risk starts with effective prioritisation of issues,” said Tom Parsons, senior director of product management, Tenable. “To keep up with the current volume and velocity of new vulnerabilities, organizations need actionable insight into where their greatest exposures lie; otherwise, remediation is no more than a guessing game. This means organizations need to focus on vulnerabilities that are being actively exploited by threat actors rather than those that could only theoretically be used.”

To address this deluge of vulnerabilities, Tenable has launched ‘Predictive Prioritisation’, an innovation which will provide organizations with the capability to prioritise those vulnerabilities which pose the greatest actual risk to the business. With Predictive Prioritization, Tenable is combining a variety of data sources and threat intelligence with advanced data science algorithms to determine the probability of a vulnerability being leveraged by threat actors. Predictive Prioritisation will be generally available in 2019.

tenable.com