Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

Mitigating CVE exploitations: Putting the ‘rapid’ into rapid response

By Dave Stapleton
Laptop open with orange, purple and pink light

Image courtesy of Andras Vas via Unsplash

January 7, 2025

Reported CVEs have increased by a whopping 30% this year. The success of a threat actors’ CVE-based attacks isn’t always dependent on leveraging a zero day. Many individuals and organizations don’t respond to published CVEs in an expedited fashion. That’s why security leaders have also seen a 10% rise in the exploitation of old vulnerabilities — hackers don’t need to rush when outdated and insufficient processes give them the opportunity to take their time!

Take the example of Fortinet. 86,000 Fortinet instances remained vulnerable to a critical flaw (CVE-2024-23113), and attackers started exploiting it after it had flown under the radar for almost nine months.

There is only so much a security team can do to be proactive in these situations; they don’t operate in a bubble, and immediately patching production systems without proper testing comes with its own risks. Bandwidth can be limited, threats are constant, and it may feel like you’re always putting out fires. However, there is potential to optimize a response in the face of emerging threats and vulnerabilities. If security leaders can better maximize their time, processes and procedures then they can be more resilient.

Damage to the nth degree

Security teams understand the criticality of patching their devices and systems. Instead, what can often be inadvertently deprioritized or overlooked is the defensibility of the connected ecosystem.

Do you know how many of your partners, suppliers, and vendors connected to your business have taken the necessary steps to safeguard themselves, and have done so in a way that aligns with your risk tolerance? Most companies don’t have high confidence in their answers. Which is why organizations often see this “mad dash” to collect emergency third-party assessments when new threats emerge.

It is also why security leaders see widespread chaos after an incident. Take this year’s CrowdStrike incident, which caused massive outages with Microsoft Windows; flights were canceled, medical procedures were halted, and financial transactions were delayed. The global impact was similar following Log4j where widespread exploitation and hacks impacted payroll processing and higher education systems.

These incidents can cost companies billions of dollars due to operational impacts, ransomware payments, litigation fees, recovery efforts, and more.

Cybercriminals are exploiting CVEs because there has been a greater volume of reported CVEs year-over-year, it’s proven to be successful, and has significant implications across the software supply chain — creating notoriety for these groups as well as more opportunity for financial gain and opportunistic hacks. There is so much pressure placed on not only security teams, but also those within procurement and compliance.

While security teams are trying to contain any damage internally, they also must work with the rest of their third-party risk management stakeholders to identify vendors that require immediate attention in response to an emerging threat. Rapid response within the interconnected ecosystem is critical, and it’s important for teams to enact a more streamlined process.

Critical components for managing threats 

Here are the critical steps for managing threats:

  1. Increase visibility into emerging threats. Knowledge is power. You can’t “fix” what you don’t know, so make sure to have the proper resources and technology to know when threats arise. Monitoring resources like CISA’s Known Exploited Vulnerabilities (KEV) catalog or NIST’s National Vulnerability Database (NVD) is a great place to start. Getting near real time alerts for vulnerabilities of interest will help reduce noise and give accurate information on the nature and severity of evolving risks.
  2. Know who is susceptible. Sending out bulk assessments to all vendors isn’t effective, or a great use of valuable resources. Security leaders want to avoid chasing down assessments and analyzing responses from vendors who have little to no access to data or systems, or may not be utilizing the software. This is where security leaders can apply proactive measures. There are a variety of different feeds and sources organizations can tap into to gain better understanding of which software a given third-party is using. Before an incident even occurs, security leaders should have their third-party ecosystem tiered out from least critical (perhaps a maintenance supplier) to most critical (like a cloud provider) inherent risk, which will allow them to know who they should be assessing when a threat is uncovered. This is where security leaders need to have a satisfactory risk management process in place.
  3. Assess. Organizations are now at a place where they can send out assessments to targeted list of critical or impacted vendors. Cut down on the noise and make sure vendors are given an assessment that is specific to the threat and doesn’t request information they already have. Security leaders want to be able to make it easy for the third-party to complete, and also more efficient for their team to review, score and act.
  4. Don’t forget to communicate! Communication, and transparency, is key, especially during high stakes scenarios when there’s many eyes on a program. Senior leaders, customers and partners will want to know that the security team is taking the necessary steps to contain the incident. Communicating the status of any efforts and disseminating reports that showcase progress will keep everyone’s mind at ease.

Rapid response isn’t as rapid as security leaders would like it to be, taking valuable days, weeks or even months to be able to respond to critical activity. If security leaders speed up and streamline their processes, they’ll be able to increase resiliency and ultimately give a little bit more time back into important schedules.

KEYWORDS: cyberattack risk assessment risk management vulnerability assessment vulnerability management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Stapleton is Chief Information Security Officer (CISO) at CyberGRX.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • voting

    Colorado Secretary of State announces new Rapid Response Election Security Unit

    See More
  • container shipments

    Rapid growth across container and kubernetes adoption, security incidents, and DevSecOps initiatives

    See More
  • Zoom

    Zoom joins CVE program as a CVE Numbering Authority (CNA)

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!