With the increasing demand for cloud and hybrid work, businesses are struggling to keep up with the management of their attack surface which is expanding at an alarming rate. The 2022 Attack Surface Threat Report shows that certain industries, such as healthcare and insurance, saw a 20-25% increase in new risks every month, with no industry showing a reduction in attack surface risks. The modern attack surface is expanding and changing every day.
Cyberattackers are taking advantage of this, using highly automated methods to find and quickly exploit vulnerabilities in target organizations, sometimes within minutes of a new Common Vulnerability and Exposure (CVE) being announced. While attackers are using automation, security teams are still struggling to inventory their assets, and are hindered by a backlog of other repairs.
To turn the odds back in the favor of the defenders, we launched our new Active Response Module to enable security teams to actively find and automatically fix their attack surface exposures. Today we are expanding our Active Response Module to automatically find and fix your attack surface exposures related to:
Additionally, starting today, Xpanse customers will also be able to natively integrate with AWS and GCP to automatically enrich incident information and cut off access to ports to prevent your assets from being exposed to the public internet. Learn more.
Proactively prevent ransomware by automatically shutting down RDP exposures:
Attackers are only becoming more sophisticated and new vulnerabilities are emerging daily. Some of the world’s largest and most demanding organizations use Xpanse to secure their attack surface by reducing their risky exposures. Xpanse protects the U.S. Department of Defense, all six branches of the U.S. military, several federal agencies, and large enterprises like Accenture, AT&T, American Express, AIG, Pfizer, and over 200 others.
To learn more, read the Active Response Module or watch the “Active Attack Surface Management with Cortex Xpanse” webinar on-demand!
1BleepingComputer:Logins for 1.3 million Windows RDP servers collected from hacker market
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.