{"id":157,"date":"2023-04-18T23:06:24","date_gmt":"2023-04-18T23:06:24","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=157"},"modified":"2024-01-22T08:44:14","modified_gmt":"2024-01-22T16:44:14","slug":"mind-the-gaps-in-the-external-attack-surface","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/","title":{"rendered":"External Risk Insights: Mind the Gaps in the External Attack Surface"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">External Risk Insights Brief from CyCognito&nbsp;<\/h2>\n\n\n\n<p>The attack surface is often larger than security teams realize. Internet exposed assets hide in plain sight, not only on primary corporate networks, but also on infrastructure belonging to subsidiaries that isn\u2019t directly managed by corporate IT security teams. This is a common issue that isn\u2019t going away soon.<\/p>\n\n\n\n<p>At CyCognito, we believe that sharing what we learn in managing attack surfaces can help progress the security community as a whole. Data we observed is a normalized aggregate of the attack surfaces of our customers, primarily Fortune 500 global organizations. Through this&nbsp;<a href=\"\/resources\/reports\/cycognito-external-risk-insights\/\">External Risk Insights report<\/a>, we track insightful trends over time and aim to share our findings with the community on a semi-annual basis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">External risks aren\u2019t distributed equally<\/h2>\n\n\n\n<p>We found interesting, and even sometimes surprising, insight. Let&#8217;s consider a stat: the average organization has 104 subsidiaries and the core security team is unaware of 10 to 31 of them \u2013 that is, until they started using CyCognito. For context, we use subsidiaries to mean any entity owned by the parent company, which can be a business unit, brand, standalone company or something similar. Those unknown subsidiaries contain assets and issues that can cause major issues for the rest of the organization.&nbsp;<\/p>\n\n\n\n<p>Subsidiaries contained an average of 56% of the critical and high vulnerabilities affecting customer assets. Tracking these assets and issues is not a one-and-done process \u2014 once issues are found and traced back to the owners, they must be fixed and validated. For organizations with unknown and under-managed subsidiaries, this process is even more difficult for parent IT security teams, particularly when it comes to ensuring vulnerabilities are successfully remediated. Issues among the subsidiaries can affect the larger organization, but without a comprehensive mapping and monitoring system, security teams in the parent org have limited visibility into these issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Making a fix and checking it twice&nbsp;for attack surface analysis<\/h2>\n\n\n\n<p>A goal of many security teams is to reduce the average amount of time between a vulnerability being discovered and the moment that issue is fixed \u2014 called the mean time to remediation (MTTR) \u2014 across their organization. A critical, but sometimes overlooked step of that process is after a fix is applied, validating that it&#8217;s been fixed correctly.<\/p>\n\n\n\n<p>CyCognito offers an in-platform remediation validation function that verifies if issues marked as remediated are actually fixed and in this report we looked to see how customers were using this feature. When users did revalidate, we found that the issue still existed 54% of the time. While some users could be simply testing the feature on issues they know haven\u2019t been resolved, there are several other reasons that issues may go unresolved:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>a fix was forgotten, so no one implemented it, and they need to be reminded<\/li>\n\n\n\n<li>a fix was started but left unfinished, perhaps due to a blocker in the system<\/li>\n\n\n\n<li>a general fix was applied, but did not fix this specific issue<\/li>\n<\/ul>\n\n\n\n<p>This shows how easy it is for remediation efforts to fall short unless security teams are proactive about monitoring their success and measuring external risk in the organization.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key risk indicator &#8211; The hits keep coming in digital attack surface management<\/h2>\n\n\n\n<p>With the frenetic pace that new vulnerabilities are being discovered and publicized (on average, based on metrics from<a href=\"https:\/\/www.cve.org\/About\/Metrics\">&nbsp;the CVE program<\/a>, in 2022 a new CVE was published every twenty minutes), security teams can expect more major security incidents that affect multiple parts of organizations, are difficult to track down&nbsp;for external risk events, and require communication across the organization to ensure fixes are successful.&nbsp;<\/p>\n\n\n\n<p>Without a comprehensive and up to date map of the attack surface that shows where issues are and which teams should remediate them, security teams are fighting an uphill battle.&nbsp;<\/p>\n\n\n\n<p>CyCognito is an<a href=\"\/external-attack-surface-management\/\">\u00a0external attack surface management<\/a>\u00a0platform designed to empower operations and security teams of risk managers\u00a0to identify, prioritize, and help remediate externally exposed IT risk. We were founded in 2017 by ex-intelligence agency reconnaissance experts that asked a simple question: \u201cwhat if we could simulate an attacker\u2019s reconnaissance plan starting only with the target company\u2019s name?\u201d Since then, we\u2019ve helped organizations map their attack surfaces and prioritize and accelerate their remediation efforts.\u00a0<\/p>\n\n\n\n<p>For more insights into external risk&nbsp;assessments that might affect your organization, check out our new&nbsp;<a href=\"\/resources\/reports\/cycognito-external-risk-insights\/\">External Risks Insights brief<\/a>. If you\u2019d like to chat with an expert about managing risk, you can schedule a demo at&nbsp;<a href=\"\/demo\/\">cycognito.com\/demo\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover valuable external risk insights. Learn how to bridge gaps in external attack surface and enhance security with actionable strategies.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[17,63,22,64],"class_list":["post-157","post","type-post","status-publish","format-standard","hentry","category-research","tag-external-attack-surface-management","tag-external-risks","tag-remediation","tag-web-applications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>External Risk Insights: Mind the Gaps in the External Attack Surface | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"External Risk Insights: Mind the Gaps in the External Attack Surface | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Discover valuable external risk insights. Learn how to bridge gaps in external attack surface and enhance security with actionable strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T23:06:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T16:44:14+00:00\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"External Risk Insights: Mind the Gaps in the External Attack Surface\",\"datePublished\":\"2023-04-18T23:06:24+00:00\",\"dateModified\":\"2024-01-22T16:44:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"External Attack Surface Management\",\"External Risks\",\"Remediation\",\"Web Applications\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\",\"name\":\"External Risk Insights: Mind the Gaps in the External Attack Surface | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2023-04-18T23:06:24+00:00\",\"dateModified\":\"2024-01-22T16:44:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"External Risk Insights: Mind the Gaps in the External Attack Surface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"External Risk Insights: Mind the Gaps in the External Attack Surface | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/","og_locale":"en_US","og_type":"article","og_title":"External Risk Insights: Mind the Gaps in the External Attack Surface | CyCognito Blog","og_description":"Discover valuable external risk insights. Learn how to bridge gaps in external attack surface and enhance security with actionable strategies.","og_url":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/","og_site_name":"CyCognito Blog","article_published_time":"2023-04-18T23:06:24+00:00","article_modified_time":"2024-01-22T16:44:14+00:00","author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"External Risk Insights: Mind the Gaps in the External Attack Surface","datePublished":"2023-04-18T23:06:24+00:00","dateModified":"2024-01-22T16:44:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/"},"wordCount":765,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["External Attack Surface Management","External Risks","Remediation","Web Applications"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/","url":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/","name":"External Risk Insights: Mind the Gaps in the External Attack Surface | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2023-04-18T23:06:24+00:00","dateModified":"2024-01-22T16:44:14+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/mind-the-gaps-in-the-external-attack-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"External Risk Insights: Mind the Gaps in the External Attack Surface"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=157"}],"version-history":[{"count":4,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/157\/revisions"}],"predecessor-version":[{"id":670,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/157\/revisions\/670"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}