Why It Takes a Coordinated Army to Remediate Vulnerabilities Fast

cropped-CIO-favicon.png?w=192Why It Takes a Coordinated Army to Remediate Vulnerabilities Fast>
CIO – HCL
From advanced phishing techniques to ransomware-as-a-service and the Log4J vulnerability, IT security threats are evolving and growing rapidly. For example, attacks on corporate networks grew by 50% from 2020 to 2021, according to Check Point Research1.

Enterprise IT and security teams tend to fall into one of three categories when it comes to IT operations and security unification. First, there are companies with teams that donât talk to one another and frankly, have no real desire to do so. The results of this lack of alignment can be devastating. Organizations that fall into the second category are working to bring IT Ops and security into alignment. However, the sheer scale of the information they share makes it difficult to prioritize work and shore up weaknesses in a timely manner. Finally, organizations in the third category have successfully unified IT operations and security, so that they work efficiently together to keep their companyâs defenses strong. Typically, these are smaller enterprises without silos, and IT operations and security are often in the same functional unit. However, thereâs no reason that larger organizations canât share the same success.

Unifying IT operations and security, especially in large organizations, is no simple task. However with the right leadership and tech tools, enterprises can ensure that their defenses will hold.
Link: https://www.cio.com/article/308928/why-it-takes-a-coordinated-army-to-remediate-vulnerabilities-fast.html


Categories:

Tags: