BlogCareersContact Us
< Back to Blog

3 Keys to Actionable Cybersecurity Threat Intelligence

Rhett Glauser
 | Mar 28, 2019
 | Vulcan Cyber CMO

Enterprises face new security threats daily. In 2017-18 alone, over 30,000 new vulnerabilities were reported. Trying to adapt to this new reality has become a tremendous challenge for security teams everywhere. Handling the influx of these new security threats has become an endless task, requiring manual, time-consuming work.

While patching may be the first solution that comes to mind, there are actually different ways to approach remediation, with workarounds and compensating controls both viable alternatives. These measures, such as closing down ports in a firewall instead of patching, enable security teams to close security gaps quickly and effectively.

Remember: there may be more than one way to handle a threat. Vulnerability remediation is a tricky business, and we’re all well aware of the risks that these processes can cause. If not handled properly, the cure could end up being worse than the disease.

That’s why when choosing a course of action, security teams must weigh out the alternatives. Here’s where Vulnerability Remediation Intelligence comes into play. By creating rich databases containing every possible solution for vulnerabilities, security teams can approach remediation efforts informed. These databases contain all patches, workarounds, configuration changes and compensating controls and actions all in one place. From patching your Linux server using configuration, management tools like Ansible or Chef, through preventing exploits using your firewall, WAF, or endpoint security product, Vulnerability Remediation Intelligence empowers security teams with the most efficient solution for every vulnerability.

Through Vulnerability Remediation Intelligence, security teams can get visibility to all the changes that were made and their implications on production.

Vulnerability Remediation Intelligence


The Advantages of Vulnerability Remediation Intelligence


Incorporating Vulnerability Remediation Intelligence in your response process provides a host of advantages. First, it drastically reduces the time-consuming, manual task that is all too common in traditional vulnerability management: finding the right solution.

Let’s say you have multiple vulnerabilities in your environment that some even have exploits in the wild. Not only that, but you’re well aware that these vulnerabilities pose a significant business risk to your organization. Without adopting Vulnerability Remediation Intelligence, this can be a real challenge: security teams will need to search dozens of solution repositories, forums, and security vendors in order to understand which patch needs to be applied to which device, which versions are compatible with the patch, and what level of technical risk the patch itself poses. Having a Vulnerability Remediation Intelligence solution in place means your database will already encompass all of this data.

Second, relying on Vulnerability Remediation Intelligence will create a greater understanding of the operational risks involved when applying a solution to a vulnerability. Through this approach, security teams can better predict the outcome of a solution. By looking at disruption indicators, be it relations between services and applications or changes in the code package dependencies, security teams can predict how a specific solution will affect their environment. Armed with this data, they’ll be able to choose the solution that’s right for their needs.

This brings us to our third benefit: choice. Incorporating Vulnerability Remediation Intelligence gives security teams the ability to choose the optimal solution; one that will require the least effort, with minimal impact on production and downtime. Providing every available solution to security teams in one place will enable them to easily choose the appropriate solution for them. This framework would narrow down rollback patches and the ever-painful unexpected downtime.

Combined, these three advantages draw a clear picture. Integrating Vulnerability Remediation Intelligence into your vulnerability response strategy is a huge boost for enterprise security.

Vulnerability Remediation Intelligence Is Here Now

The solution described here is not hypothetical. Vulcan Cyber’s Continuous Remediation platform is here today.

Our platform provides the world’s only community and research driven solution repository, recommending the most appropriate solution for every vulnerability.


About the Author

Rhett Glauser

Rhett has been running corporate marketing and demand generation functions in the enterprise infrastructure and security markets for a really long time. Prior to Vulcan Cyber Rhett spent more than two decades with SaltStack, ServiceNow, Symantec and Altiris.

People also read

The MITRE ATT&CK framework and more – introducing Voyager18

Read More >

9 AWS Security Tools You Should Know About

Read More >

SANS Cloud Security Survey 2022 – highlights

Read More >

How to fix the zero day CVE-2022-22620 vulnerability

Read More >

CIS Benchmarks and system hardening: the ultimate guide

Read More >
< Back to Blog
Did you find this interesting? Share it with others:

Be a Fixer