Developers of malware and other malicious code are creating new methods of exploiting systems on a daily basis. The proliferation of malware presents elevated cyber risk to all organizations. Malware often exploits vulnerabilities making software or hardware perform actions not originally intended. Vulnerabilities can also be widely exploited shortly after publication, as malware authors reverse engineer the fix and come up with “1-day exploits” that can be used to attack organizations.
Developers of malware and other malicious code are creating new methods of exploiting systems on a daily basis. Tenable.io easily identifies the hosts most vulnerable to malware and other exploitation frameworks. This dashboard provides the necessary context to understand which assets are vulnerable to malware. By supplying the context and associated metrics, the organization a can better communicate the cyber risk to the business.
Modern ransomware and malware are often built using an exploit framework, can be initially developed with the assistance of an exploit framework. This dashboard also provides some context with exploitability using frameworks such as CANVAS or Core Impact.
Cyber Exposure is the next frontier for empowering organizations to accurately understand, represent and ultimately reduce their cyber risk against the rapidly changing modern attack surface. Organizations that embrace Cyber Exposure are learning a new discipline on how to manage and measure their cyber risk across traditional and non-traditional assets, such as container security, cloud services, and web applications. Knowing which areas of your business are secure or exposed, allows for more effective measurement of an organization’s Cyber Risk. For example, how much and where to invest to reduce risk to an acceptable amount and help drive strategic business decisions.
Exploitable Vulnerability Summary: This component displays a summary of vulnerabilities that are exploitable by malware
Exploitable Matrix: This component is an indicator matrix of exploitable vulnerabilities
Top 100 Vulnerabilities Exploitable by Malware: This component provides a host summary of systems with vulnerabilities that are known to be exploitable by malware
Top 100 Malware Vulnerable Hosts: This component provides a host summary of systems with vulnerabilities that are known to be exploitable by malware