Eliminating the Attacker’s Advantage – Why Original Research Matters

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email

One problem which has been lingering for too long in the security industry is the concept that “security research” has long been way more of an art than a science. As our industry matures, we need to change this approach and add more scientific rigor to our industry.

This is why at Tenable, we decided to take a pragmatic and formal approach to research. We believe that there’s an urgent need to make the internet a safer place for everyone. For us, that begins with a singular focus on pinpointing security problems and sharing our findings quickly, openly and responsibly with the broader tech community.

Today we’re unveiling Quantifying the Attacker’s First-Mover Advantage – a first-of-its-kind study that looks at the immediate, crucial moves that security teams and their adversaries make in the hours or days after a vulnerability is first discovered. This type of study is important for our industry as we continue to hone the discipline and rigor that we apply to driving security into the very heart of every digital organization. Moreover, Quantifying the Attacker’s First-Mover Advantage indicates that security is a sprint, not a marathon and that the way the race begins has tremendous implications for how it will end. It also underscores the need for a more agile approach to security, a CI/CD-inspired cyber program more in sync with the realities of today’s dev cycles, if you will.

We believe that this type of research is one fundamental way that we can help to keep people safer. It’s one of the ways we give back to the community.

Expect to hear more from our researchers over the next few weeks as we unveil new, original research.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
1611 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel