New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

The security gaps that can be exposed by cybersecurity asset management

New York Tech Editorial Team by New York Tech Editorial Team
March 29, 2022
in Cybersecurity
0
Confidential computing market to reach $54 billion in 2026
Share on FacebookShare on Twitter

Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the protection of corporate infrastructure. It is no secret that just one vulnerable, unsecured endpoint can open the gate for criminals to walk through, and as points of access increase exponentially, so does the element of risk.

cybersecurity asset management

Which is why cybersecurity asset management is transforming the way in which enterprises manage and protect their assets. It works by correlating data from various solutions within an organization’s infrastructure to provide a complete and always up-to-date asset inventory. That way, IT and security teams can easily identify security gaps, ensure assets follow security policies, and know immediately whether an asset has deviated from that policy in any way. We can also automate actions based on deviations.

Security teams face multiple challenges, but with asset management at their disposal, these can be addressed more easily. Here we identify five potential issues that can be uncovered by a cybersecurity asset management program.

Endpoint agents not being properly used

There is a plethora of tools being used to secure assets, including desktops, laptops, servers, virtual machines, smartphones, and cloud instances. But despite this, companies can struggle to identify which of their assets are missing the relevant endpoint protection platform/endpoint detection and response (EPP/EDR) agent defined by their security policy. They may have the correct agent but fail to understand why its functionality has been disabled, or they are using out-of-date versions of the agent.

The importance of understanding which assets are missing the proper security tool coverage and which are missing the tools’ functionality cannot be underestimated. If a company invests in security and then suffers a malware attack because it has failed to deploy the endpoint agent, it is a waste of valuable resources.

Agent health and cyber hygiene depends on knowing which assets are not protected, and this can be challenging. The admin console of an EPP/EDR can provide information about which assets have had the agent installed, but it does not necessarily prove that the agent is performing as it should.

Unknown unmanaged assets

The unknown of unmanaged assets is where vulnerabilities lie. With no management or agents installed, these devices – which may include desktops that are rarely used or laptops that are intermittently connected to the corporate network – present a threat.

Unmanaged devices might be identifiable to the network or to network scanners, but that does not provide useful information about them, such as whether they are part of a patch schedule or whether they need to have an EPP/EDR agent installed.

Passwords and permissions

Amongst the various Active Directory (AD) permissions that should not be set for users are three that we can focus on: AD password never expires, AD password not required, and AD no pre-authentication required.

There are risks for security teams if users have an account in AD with no required password, particularly if it is a domain admin account on a domain controller. The user will also not be subject to policies regarding password length and may be using a shorter password than is needed, or worse, no password at all, even if this is permitted.

The difficulty of having no pre-authentication set is that a cyber attacker can send a dummy request for authentication, and the key distribution center (KDC) will return an encrypted Ticket Granting Ticket (TGT) which the attacker can brute force offline. All that will be evident in the KDC logs is a single request for a TGT. If a Kerberos timestamp pre-authentication is enforced, the attacker cannot ask the KDCs for the encrypted material to brute force offline. The attacker must encrypt a timestamp with a password and provide it to the KDC, which they can do repeatedly. But by enforcing this, the KDC log will record the entry every time the pre-authentication fails.

VA tools can only scan cloud instances they know about

With more and more organizations moving to the cloud, the security solutions that have been implemented to protect their on-premise assets are struggling to keep up.

Vulnerability assessment (VA) tools, for example, are designed to scan a network to find devices with known vulnerabilities, but they can only scan what they know about. Because of its dynamic nature, the cloud can create a gap in which there are new instances and VA tools are not aware that these need to be scanned.

This is why attackers have been able to exploit zero-days to install ransomware on cloud servers that do not require end users to click on anything to be launched.

Keeping up to date with critical vulnerabilities

Assets with critical vulnerabilities are those within the Common Vulnerabilities and Exposures (CVE) classification and defined as deficient or vulnerable to a direct or indirect attack that will create decisive or significant effects.

Published vulnerabilities are, obviously, those that are exploitable and devices that have these are a common target for attackers. So, it makes sense that security teams pay attention to patching and updating their assets if they are found to have critical vulnerabilities.

This is not an exhaustive summary, nor is it a list of headline-grabbing vulnerabilities, but instead it addresses fundamental security practices. If security teams can take control of the devices that their organizations are adopting for innovation and improved efficiency and ensure they are protecting the full asset portfolio, they will significantly reduce vulnerabilities and improve their risk posture.

Credit: Source link

Previous Post

3 Best Fintech Stocks for a Portfolio Boost

Next Post

VC-backed Aerium develops antibody treatment for Covid-19

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
10 Raunchy Movies on Netflix You Won’t Regret Watching

10 Raunchy Movies on Netflix You Won’t Regret Watching

May 20, 2024
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026
New CISO Whisperer report highlights shift toward identity, integrity, and automation oversight

New CISO Whisperer report highlights shift toward identity, integrity, and automation oversight

February 23, 2026
AIUP and AINT*: FINQ Launches the First ETFs Fully Managed by Artificial Intelligence

AIUP and AINT*: FINQ Launches the First ETFs Fully Managed by Artificial Intelligence

February 11, 2026

Recommended

Automat-it Vanta partnership

Automat-it And Vanta Partner To Transform Compliance Into A Growth Engine For AWS Startups

March 5, 2026
PointFive DeepWaste

DeepWaste AI Expands Cost Optimization to GPU Waste, Misconfigurations, and Provisioning Leakage

March 5, 2026
Reclaim Security team

Reclaim Security Raises $26M to Close the Remediation Gap With AI-Driven Automation

March 4, 2026
woman in green top posing beside a mirror wall

Inside the AI Shift: How Dolica Gopisetty Helps Enterprises Turn Hype into Real Transformation

February 25, 2026

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

AI AI QSRs Allseated AWS B2B marketing Business CISO CISO Whisperer coding Collaborations Companies To Watch cryptocurrency Cybersecurity Entrepreneur Fetcherr Finance FINQ Fintech hi-tech Hi Auto Investing Investors investorsummit Israel israelitech Leaders LinkedIn Leaders Metaverse Mindset Minnesota omri hurwitz OurCrowd PointFive PR QSR Real Estate start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media