In a Galaxy Far Away: How to approach vulnerability assessment, Part 2

More challenges and solutions that cyber security professionals and astronomers share.

In Part 1 of this series we examined why, like astronomers and astro-physicists do in their studies and explorations, it’s important for cybersecurity professionals to measure things from different angles to get a complete picture. And how that approach helps you overcome barriers that exist with just a single way of looking at things. 

We looked at two ways to look at your organization’s vulnerabilities—vulnerability and best practice assessment and security controls assessment.

In Part 2 of this series, we’ll examine simulations and threat assessments as two other ways to look at your organization’s vulnerabilities.

Another challenge that cybersecurity professionals and astronomers share is that you have to correlate your findings across many sources of information to infer what's really going on. This takes experience and a strong understanding of the data. For example, if a vulnerability is detected on a system and you find that the vulnerability has been posted on a dark web site, that can increase the likelihood of an attack. Conversely, you may have mitigating controls in place that make certain vulnerabilities less likely to be exploited.  

To understand the true nature of your security posture, you have to not only understand your overall ecosystem, but know how various controls relate to each other. This is where deep security expertise comes in handy.

By taking a comprehensive view of your security posture and enlisting security professionals to help you correlate results, you can truly understand and improve your organization’s cyber risk.

Watch a demo of Trava's phishing simulation.

[1]Cybersecurity threat trends report, 2021, Cisco.