Trending...
- Foiling Freaks Launches New Online Platform Dedicated to Foiling Board Sports
- City of Tacoma Recognized for 39th Consecutive Year with Highest Honor in Governmental Financial Reporting
- Best Spiritual Healing, Meditation & Retreats in Sedona — Rise Meditation Helps You Find and Book Transformational Experiences
KIRKLAND, Wash. and TEL AVIV, Israel, Sept. 14, 2021 /PRNewswire/ -- Cyberpion, a cybersecurity pioneer in external attack surface management (EASM), today presented research showing that nearly three quarters of Fortune 500 companies' IT infrastructure exists outside their organization, a quarter of which was found to have a known vulnerability that threat actors could infiltrate to access sensitive employee or customer data.
Key research findings:
Cyberpion collected these results by performing a cursory single-pass scan of the public and internet-facing assets of every Fortune 500 company in the first half of 2021.
More on Washingtoner
According to Gartner1, "EASM is an emerging concept that is growing quickly in terms of awareness within the security vendor community but at a slower pace within end-user organizations...They help security professionals identify exposed vulnerabilities from known and unknown enterprise assets and prioritize the most critical issues to be tackled...EASM should be part of a broader vulnerability and threat management effort aimed at discovering and managing internal- and external-facing assets and their potential vulnerabilities."
Traditional third-party risk management solutions have focused exclusively on the vendors and the IT infrastructures that are directly connected to the enterprise. This approach ignores the true scale of the problem and represents only the tip of the iceberg. Third-party vendors have also adopted a distributed IT infrastructure, and have built their applications and services using their own vendors and third-parties. Those in turn build their solutions upon even more partners. This extensive ecosystem creates an external attack surface that is uniquely appealing to hackers to attack, and extremely complicated for enterprises to manage securely.
Hackers are finding it easier to takeover or exploit the vulnerabilities in the third-party assets within the enterprise's ecosystem in order to carry out attacks such as: malicious code injection (Magecart-style attacks), DNS hijacks, or abusing the branded assets of an enterprise. These breaches ultimately lead to data loss, brand reputation damage, and stolen customer data for the enterprise.
"Security teams often can't effectively defend against attacks stemming from third-parties because they lack visibility into the total inventory and volume of assets they are connected to," said Cyberpion CEO Nethanel Gelertner. "They are unaware of the exposure to these external vulnerabilities, and can't identify and mitigate against these risks. In addition, the growth of these interconnected assets continues to explode due to trends in cloud-first architectures and digital transformation initiatives, meaning that assessing and protecting the attack surface has become even more challenging over time."
More on Washingtoner
About Cyberpion
Cyberpion solves the rising cybersecurity challenge of understanding the risks and vulnerabilities of your connected online assets that form an external attack surface. Knowing how your organization is vulnerable, where those threats come from, and what infrastructures are at risk, is critical to preventing an attack before it happens. Cyberpion helps organizations mitigate these advanced threats by continuously monitoring, discovering, and assessing the threat vectors present throughout online ecosystems that exist outside the traditional security perimeter. With an R&D team based in Israel, the company is funded by leading cybersecurity venture capitalists. To learn more, visit cyberpion.com.
For more information, please contact:
Josh Turner
Si14 Global Communications
josh.[email protected]
1 Gartner, "Emerging Technologies: Critical Insights for External Attack Surface Management" by Ruggero Contu, Elizabeth Kim and Mark Wah, March 19, 2021
SOURCE Cyberpion
Key research findings:
- 73% of Fortune 500 companies' total IT infrastructure is external to the organization, of which 24% is considered at risk or has a known vulnerability
- The total IT infrastructure includes the IT assets that are owned and operated by vendors the Fortune 500 enterprises incorporated into their online footprint
- These IT assets include servers, cloud storage, CDNs, DNS (Domain Name Servers), email servers and other online elements
- 71% of total cloud-based IT assets are external to the organization, of which 25% failed at least one security test
- An example of cloud vulnerability includes cloud storage configured to allow anyone to read or write its contents
- On average, a Fortune 500 company's infrastructure contains 126 different login pages for either customer or employee portals or services - the highest number was over 3,000
- Nearly 10% of these login pages are considered insecure due to the transmission of unencrypted login data, or issues with SSL certificates, which helps ensure that the submission is being sent to the authorized destination
- 30% allow transmission over HTTP
- 12% have invalid certificates/encryption
- Hackers exploiting these logins could access a wealth of sensitive employee or customer data
- Fortune 500 organizations connect to an average of 951 cloud assets, of which nearly 5% are vulnerable to severe abuse
- For example, a misconfigured AWS bucket could allow hackers to read or overwrite the data which could be customer PII or application code
- The largest exposure was well over 30K cloud assets
Cyberpion collected these results by performing a cursory single-pass scan of the public and internet-facing assets of every Fortune 500 company in the first half of 2021.
More on Washingtoner
- City of Tacoma Implements Strategic Freeze on Hiring and Promotions
- Spokane Police Officers Rescue Puppy After Thief Abandoned It
- Green Office Partner Strengthens Global Operations with Mexico-Based DigitalVAAR Partnership
- P-Wave Classics Announces the Publication of The Female Quixote, Volume I, by Charlotte Lennox
- Everwild Music Festival Unveils 2026 Schedule: No Overlapping Sets, Longer Performances, and Epic Late-Night Sets!
According to Gartner1, "EASM is an emerging concept that is growing quickly in terms of awareness within the security vendor community but at a slower pace within end-user organizations...They help security professionals identify exposed vulnerabilities from known and unknown enterprise assets and prioritize the most critical issues to be tackled...EASM should be part of a broader vulnerability and threat management effort aimed at discovering and managing internal- and external-facing assets and their potential vulnerabilities."
Traditional third-party risk management solutions have focused exclusively on the vendors and the IT infrastructures that are directly connected to the enterprise. This approach ignores the true scale of the problem and represents only the tip of the iceberg. Third-party vendors have also adopted a distributed IT infrastructure, and have built their applications and services using their own vendors and third-parties. Those in turn build their solutions upon even more partners. This extensive ecosystem creates an external attack surface that is uniquely appealing to hackers to attack, and extremely complicated for enterprises to manage securely.
Hackers are finding it easier to takeover or exploit the vulnerabilities in the third-party assets within the enterprise's ecosystem in order to carry out attacks such as: malicious code injection (Magecart-style attacks), DNS hijacks, or abusing the branded assets of an enterprise. These breaches ultimately lead to data loss, brand reputation damage, and stolen customer data for the enterprise.
"Security teams often can't effectively defend against attacks stemming from third-parties because they lack visibility into the total inventory and volume of assets they are connected to," said Cyberpion CEO Nethanel Gelertner. "They are unaware of the exposure to these external vulnerabilities, and can't identify and mitigate against these risks. In addition, the growth of these interconnected assets continues to explode due to trends in cloud-first architectures and digital transformation initiatives, meaning that assessing and protecting the attack surface has become even more challenging over time."
More on Washingtoner
- Riggo Production Studio Launches Monthly Content Package for Growing Brands
- Accelerating into Active Oil Production with over 100 Barrels per day now being produced as Dual-revenue engine begins Generating Cash Flow: $IBG
- Finland emerges as clear Eurovision 2026 favourite – analysis of 12 bookmakers by Vedonlyöntisivut
- Mac Mountain Selects netElastic vRouter for LightCraft Broadband-as-a-Service Platform
- 88% Revenue Growth; Charging Into the Future with Explosive Growth, Strategic EV Expansion and Infrastructure Dominance Signal a Breakout Opportunity
About Cyberpion
Cyberpion solves the rising cybersecurity challenge of understanding the risks and vulnerabilities of your connected online assets that form an external attack surface. Knowing how your organization is vulnerable, where those threats come from, and what infrastructures are at risk, is critical to preventing an attack before it happens. Cyberpion helps organizations mitigate these advanced threats by continuously monitoring, discovering, and assessing the threat vectors present throughout online ecosystems that exist outside the traditional security perimeter. With an R&D team based in Israel, the company is funded by leading cybersecurity venture capitalists. To learn more, visit cyberpion.com.
For more information, please contact:
Josh Turner
Si14 Global Communications
josh.[email protected]
1 Gartner, "Emerging Technologies: Critical Insights for External Attack Surface Management" by Ruggero Contu, Elizabeth Kim and Mark Wah, March 19, 2021
SOURCE Cyberpion
0 Comments
Latest on Washingtoner
- Architect of Neurodiversity Will Lead the First U.S. Team of Autistic Children to the "Genius Cup" in Hiroshima, Japan, in 2027
- Foiling Freaks Launches New Online Platform Dedicated to Foiling Board Sports
- Deborah E. Jones Introduces Emotional Sovereignty, a Powerful New Book on Emotional Mastery, Resilience, and Intentional Living
- New Research Identifies "The Busy Effect": 89% of Americans Want a Laid-Back Vacation — Only 15% Actually Achieve It
- Alchemy 43 Appoints Shane Smith as CEO to Drive Operational Performance and Scalable Growth
- Best Spiritual Healing, Meditation & Retreats in Sedona — Rise Meditation Helps You Find and Book Transformational Experiences
- City of Tacoma Recognized for 39th Consecutive Year with Highest Honor in Governmental Financial Reporting
- Tacoma: City to Conduct Essential Asphalt Repairs on Proctor Street April 6 – 10
- $16 Billion Market by 2034 in Underwater Drones Presents Huge Opportunity for AI-Powered Autonomous Vehicle Serving Defense & Commercial Customers
- Appliance EMT Named Among Jacksonville's Top 3 Appliance Repair Companies by ThreeBestRated®
- Western Washington Coalition for Life Announces Participation in International 40 Days for Life
- Geekstorians Nominated For Best History Podcast In The 30th Annual Webby Awards
- Quality Water Treatment Unveils SoftPro Elite HE Water Softener for City Water, Setting a New Standard in Residential Water Treatment
- UK Financial Ltd Chooses PUMP.FUN App to Launch Maya Meme's Minor-League Meme Coins and Announces Lifetime Airdrop Program
- Suspect Arrested, Stolen Trailer and Property Recovered in Tacoma Vehicle Theft Investigation
- Boston Industrial Solutions Expands Its Industry-Leading UV Ink Portfolio with the Launch of a Matte Ink - Natron® UVPZ
- Century Fasteners Corp. Exhibiting at 2026 MRO Americas Show – April 21-23, 2026 – Booth #2257
- Blue Sparrow Coffee named Best Matcha in Westword's Best of Denver 2026
- Ocean County College Introduces Pathways to Simplify the Student Journey and Strengthen Career Connections
- Kiko Nation Expands to Apple App Store, Achieving Full Mobile Deployment for Livestock Digital Registry Platform