Netskope vuelve a ser reconocido como Líder en el Cuadrante™ Mágico de Gartner® para plataformas SASE. Obtener el Informe

cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Ponte manos a la obra con la plataforma Netskope
          Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope ha sido reconocido como Líder con mayor visión tanto en plataformas SSE como SASE
            2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
            One unified platform built for your journey
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
                Prevención de pérdida de datos (DLP) moderna para dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
                  Libro SD-WAN moderno para principiantes de SASE
                  SD-WAN moderna para maniquíes SASE
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access es la única solución que le permite retirar su VPN para siempre.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Hagamos grandes cosas juntos
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                ""
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) proporciona a los clientes potentes herramientas de integración para aprovechar las inversiones en su postura de seguridad.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      Cybersecurity Awareness Month: Adding Threat to Vulnerability Management

                                      Nov 01 2022

                                      Vulnerability management can be more than just running scans and sorting by Common Vulnerability Scoring System scores! Take your program to the next level by adding a threat-based approach to vulnerability management by combining the hacker mindset with cyber threat intelligence. With so many vulnerabilities published daily, having a team knowledgeable with the latest threats can help IT teams quickly identify assets that require expedited remediation. 

                                      What is Threat and Vulnerability Management?

                                      Threat and Vulnerability Management is a proactive approach to applying risk and prioritization to vulnerabilities based on the threats to the organization. A threat-based approach involves having to prioritize assets for immediate remediation and/or mitigation, determining the risk to the organization base. This approach combines skill sets from multiple areas of cybersecurity and creates a program that is a value-add to the organization as a whole and creates synergy between teams. These skill sets include:

                                      • Cyber threat intelligence
                                      • Ethical Hacking and Red Team testing
                                      • Incident response

                                      Roles Threat and Vulnerability Management plays in a cyber organization

                                      Vulnerability Management 

                                      Threat and vulnerability management’s core role is in vulnerability management. Why is there a need? Not all assets are created, managed and patched equally. Some vulnerabilities may require immediate attention that is shorter than the established SLAs for an organization. Key items for threat in vulnerability management:

                                      • Mapping the internal and external attack surface.
                                      • Understanding the environment and technology stack.
                                      • Utilizing threat intelligence to drive prioritization and determine risk.

                                      Threat teams can build a prioritization model for their organization’s assets after reviewing the organization as a whole and determine areas that are at risk for exploitation. Vulnerability analytics from a tools perspective can help and build on this but organizations must really gauge if their programs are mature enough to fully utilize vulnerability analytics based on the key items listed above. This means focusing on building the people to create the process and apply it to the technology

                                      Experts on Threat

                                      Threat teams must also understand the latest in tactics, techniques, and procedures utilized by threat actors targeting their organization. This is where combining the hacker mindset with threat intelligence is important to building a threat program. Team’s should have a finger on the pulse of cyber news and latest in exploitation. Therefore, it is key that threat teams learn, understand, and utilize the same tools used by threat actors. Often this means working with red team members on testing the security stacks against the latest threats and identifying gaps which could result in custom rules for detection and/or blocking. 

                                      This role in the organization can provide value to teams such as the security operations center (SOC)/incident response (IR). Threat team members, through their vulnerability management role and engagement with IT teams, should be familiar with the environment. This knowledge can be utilized to host threat hunts, purple team events, and tabletop exercises giving teams the practice that is needed built around their organizations attack surface.

                                      Summary

                                      A threat and vulnerability management program combining different skill sets from various other cyber teams can lead to an effective team that can be the center of your cyber security program. From offering a better understanding of threats to prioritizing assets for remediation, threat teams can bring value to your organization in many more ways. Be sure to check out a more detailed blog on Cyber Threat Intelligence within a Threat and Vulnerability Management program here.

                                      author image
                                      John Khotsyphom
                                      John Khotsyphom is the Manager of Threat and Vulnerability Mgmt. at Netskope. John has over 15 years in network security, penetration testing, and threat management.
                                      John Khotsyphom is the Manager of Threat and Vulnerability Mgmt. at Netskope. John has over 15 years in network security, penetration testing, and threat management.
                                      Conéctese con Netskope

                                      Subscribe to the Netskope Blog

                                      Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.