SafeBreach Simplifies Discovery of IT Security Vulnerabilities

Mike Vizard
Slide Show

The Best Security Advice from Leading Experts

One of the fundamental problems with IT security is that the IT environment is becoming more complex, while both the volume and types of attacks that IT organizations need to defend against continue to grow. All that complexity increases the overall attack surface to be defended, which by definition means more vulnerabilities than ever can be exploited.

To help IT organizations discover those vulnerabilities, SafeBreach this week launched a namesake platform that allows IT organizations to use an automated playbook to launch scripted attacks to discover where IT vulnerabilities lie. SafeBreach CEO Guy Bejerano says SafeBreach has taken years of security research and encapsulated it in the form of a playbook that allows its platforms to launch an artificial attack. The platform then discovers which vulnerabilities are being exploited in those attacks, which allows IT organizations to remediate those issues before they are exploited by real cybercriminals.

Bejerano says as new attacks are developed, SafeBreach will continue to update its platform. That in effect creates something of a spy versus spy cycle of updates between SafeBreach and the hacking community, says Bejerano.

credit-card-dataexfiltration

In general, Bejerano notes that the vast majority of attacks make use of relatively simple exploits. The trouble is that given the complexity of IT environments today, it’s hard for IT organizations to discover when a vulnerability that is commonly exploited is introduced into their IT environment.

SafeBreach doesn’t automate the remediation of those vulnerabilities. But it does provide access to information that IT organizations need to prioritize their IT security efforts. After all, not everything in an IT environment can be secured equally well. But when it comes to critical business assets, there’s no real acceptable excuse for not at least making a best effort to eliminate the vulnerabilities that cybercriminals routinely exploit. That may not prevent them from coming up with more innovative attacks, but it may make their task just difficult enough that they will go look for an easier target somewhere else.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.