Organizations have implemented various aspects of threat exposure validation, including security control validation (51%) and filtering threat exposures based on the effectiveness of security controls to mitigate threats (48%), according to Cymulate. At the same time, nearly all respondents say they have implemented exposure validation in one or more areas, including cloud security (53%), security controls (49%), response (36%) and threats (34%). Optimizing defense with exposure validation The report surveyed 1,000 security leaders, SecOps practitioners, … More
The post Exposure validation emerges as critical cyber defense component appeared first on Help Net Security.
This article has been indexed from Help Net Security